CINXE.COM
WiMNeT - Accepted Papers
<!DOCTYPE html><html lang="en-US" itemscope itemtype="http://schema.org/WebPage"><head><meta charset="utf-8"><script nonce="3Kdf6j9dMwjDEvAJ1hykDw">var DOCS_timing={}; DOCS_timing['sl']=new Date().getTime();</script><script nonce="3Kdf6j9dMwjDEvAJ1hykDw">function _DumpException(e) {throw e;}</script><script data-id="_gd" nonce="3Kdf6j9dMwjDEvAJ1hykDw">window.WIZ_global_data = {"K1cgmc":"%.@.[null,null,null,[null,1,[1732002835,301267000]]]]","nQyAE":{}};</script><script nonce="3Kdf6j9dMwjDEvAJ1hykDw">_docs_flag_initialData={"atari-emtpr":false,"atari-eibrm":false,"docs-text-elei":false,"docs-text-usc":true,"atari-bae":false,"docs-text-emtps":true,"docs-text-etsrdpn":false,"docs-text-etsrds":false,"docs-text-endes":false,"docs-text-escpv":true,"docs-text-ecfs":false,"docs-text-ecis":true,"docs-text-eectfs":true,"docs-text-edctzs":true,"docs-text-eetxpc":false,"docs-text-eetxp":false,"docs-text-ertkmcp":true,"docs-text-ettctvs":false,"docs-text-ettts":true,"docs-text-escoubs":false,"docs-text-escivs":false,"docs-text-escitrbs":false,"docs-text-ecgvd":false,"docs-text-esbbcts":true,"docs-text-etccdts":false,"docs-text-etcchrs":false,"docs-text-etctrs":false,"docs-text-eltbbs":true,"docs-text-ecvdis":false,"docs-text-elaiabbs":false,"docs-text-eiosmc":false,"docs-text-ecslpo":false,"docs-text-etb":false,"docs-text-esbefr":false,"docs-text-ipi":false,"docs-etshc":false,"docs-text-tbcb":2.0E7,"docs-efsmsdl":false,"docs-text-etof":false,"docs-text-ehlb":false,"docs-text-epa":true,"docs-text-dwit":false,"docs-text-elawp":false,"docs-eec":false,"docs-ecot":"","docs-text-enbcr":false,"docs-sup":"","umss":false,"docs-eldi":false,"docs-dli":false,"docs-liap":"/logImpressions","ilcm":{"eui":"AHKXmL3fqJLIwi_NIR5NQSFT2OW_W8MScKUqMnMkanfut8wTMQemUiuYszjL6cmJWfGI0eek9hQ0","je":1,"sstu":1732330312469097,"si":"COqUoqe58YkDFaoDbwYdJc8xGg","gsc":null,"ei":[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747261,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94353368,94353376,94390153,94390161,94397741,94397749,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444282,94444290,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086181,95086189,95087186,95087194,95087217,95087225,95112873,95112881,95118561,95118569,95135933,95135941,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95266740,95266748,95270945,95270953,95271343,95271351,95314802,95314810,95317985,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101544667,101544675,101606928,101606936,101617516,101617524,101631040,101631048,101705089,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101922729,101922737],"crc":0,"cvi":[]},"docs-ccdil":false,"docs-eil":true,"info_params":{},"buildLabel":"editors.sites-viewer-frontend_20241112.02_p1","docs-show_debug_info":false,"atari-jefp":"/_/view/jserror","docs-jern":"view","atari-rhpp":"/_/view","docs-ecuach":false,"docs-cclt":2033,"docs-ecci":true,"docs-esi":false,"docs-efypr":true,"docs-eyprp":true}; _docs_flag_cek= null ; if (window['DOCS_timing']) {DOCS_timing['ifdld']=new Date().getTime();}</script><meta name="viewport" content="width=device-width, initial-scale=1"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="referrer" content="origin"><link rel="icon" href="https://lh4.googleusercontent.com/dgtWGwGjwi5ZzOSQ-rG_dEqux2JHA5V1iKf9ZsyX1EV3uBR9Ri-h2h9ZRh_BPRPRv71pQDyjdPchnRpF63mEK2TsQDp2q3fjV9oKEdMEBRw7Vw"><meta name="robots" content="noindex"><meta property="og:title" content="WiMNeT - Accepted Papers"><meta property="og:type" content="website"><meta property="og:url" content="https://sites.google.com/view/wimnet-2023/accepted-papers"><meta property="og:description" content="Accepted Papers "><meta itemprop="name" content="WiMNeT - Accepted Papers"><meta itemprop="description" content="Accepted Papers "><meta itemprop="url" content="https://sites.google.com/view/wimnet-2023/accepted-papers"><meta itemprop="thumbnailUrl" content="https://lh4.googleusercontent.com/R_YK6aPWpFTpR6FkDvkedLEkFLWhS0no0d2E3JNQShThFC6kuocdRv-djDlOFCTKlUT6fA7VYdXOMQqRVXkwC2k=w16383"><meta itemprop="image" content="https://lh4.googleusercontent.com/R_YK6aPWpFTpR6FkDvkedLEkFLWhS0no0d2E3JNQShThFC6kuocdRv-djDlOFCTKlUT6fA7VYdXOMQqRVXkwC2k=w16383"><meta itemprop="imageUrl" content="https://lh4.googleusercontent.com/R_YK6aPWpFTpR6FkDvkedLEkFLWhS0no0d2E3JNQShThFC6kuocdRv-djDlOFCTKlUT6fA7VYdXOMQqRVXkwC2k=w16383"><meta property="og:image" content="https://lh4.googleusercontent.com/R_YK6aPWpFTpR6FkDvkedLEkFLWhS0no0d2E3JNQShThFC6kuocdRv-djDlOFCTKlUT6fA7VYdXOMQqRVXkwC2k=w16383"><link href="https://fonts.googleapis.com/css?family=Lato%3A300%2C300italic%2C400%2C400italic%2C700%2C700italic&display=swap" rel="stylesheet" nonce="RdCWz59YtR9tSO53Gi5Aww"><link href="https://fonts.googleapis.com/css?family=Google+Sans:400,500|Roboto:300,400,500,700|Source+Code+Pro:400,700&display=swap" rel="stylesheet" nonce="RdCWz59YtR9tSO53Gi5Aww"><link href="https://fonts.googleapis.com/css?family=Roboto%3Ai%2Cbi%2C700%2C400&display=swap" rel="stylesheet" nonce="RdCWz59YtR9tSO53Gi5Aww"><link rel="stylesheet" href="https://www.gstatic.com/_/atari/_/ss/k=atari.vw.7R57rYYVGiA.L.X.O/am=MBiA/d=1/rs=AGEqA5nH97dOwqY0iGblvGlWiaR59owncA" data-id="_cl" nonce="RdCWz59YtR9tSO53Gi5Aww"><script nonce="3Kdf6j9dMwjDEvAJ1hykDw"></script><title>WiMNeT - Accepted Papers</title><style jsname="ptDGoc" nonce="RdCWz59YtR9tSO53Gi5Aww">.M63kCb{background-color: rgba(255,255,255,1);}.OUGEr{color: rgba(33,33,33,1);}.duRjpb .OUGEr{color: rgba(34,110,147,1);}.JYVBee .OUGEr{color: rgba(34,110,147,1);}.OmQG5e .OUGEr{color: rgba(33,33,33,1);}.iwQgFb{background-color: rgba(0,0,0,0.150000006);}.ySLm4c{font-family: Lato, sans-serif;}.CbiMKe{background-color: rgba(30,108,147,1);}.qeLZfd .zfr3Q{color: rgba(33,33,33,1);}.qeLZfd .qnVSj{color: rgba(33,33,33,1);}.qeLZfd .Glwbz{color: rgba(33,33,33,1);}.qeLZfd .duRjpb{color: rgba(34,110,147,1);}.qeLZfd .qLrapd{color: rgba(34,110,147,1);}.qeLZfd .JYVBee{color: rgba(34,110,147,1);}.qeLZfd .aHM7ed{color: rgba(34,110,147,1);}.qeLZfd .OmQG5e{color: rgba(33,33,33,1);}.qeLZfd .NHD4Gf{color: rgba(33,33,33,1);}.qeLZfd .aw5Odc{color: rgba(0,101,128,1);}.qeLZfd .dhtgD:hover{color: rgba(0,0,0,1);}.qeLZfd .dhtgD:visited{color: rgba(0,101,128,1);}.qeLZfd .iwQgFb{background-color: rgba(0,0,0,0.150000006);}.qeLZfd .OUGEr{color: rgba(33,33,33,1);}.qeLZfd .duRjpb .OUGEr{color: rgba(34,110,147,1);}.qeLZfd .JYVBee .OUGEr{color: rgba(34,110,147,1);}.qeLZfd .OmQG5e .OUGEr{color: rgba(33,33,33,1);}.qeLZfd:before{background-color: rgba(242,242,242,1); display: block;}.lQAHbd .zfr3Q{color: rgba(255,255,255,1);}.lQAHbd .qnVSj{color: rgba(255,255,255,1);}.lQAHbd .Glwbz{color: rgba(255,255,255,1);}.lQAHbd .duRjpb{color: rgba(255,255,255,1);}.lQAHbd .qLrapd{color: rgba(255,255,255,1);}.lQAHbd .JYVBee{color: rgba(255,255,255,1);}.lQAHbd .aHM7ed{color: rgba(255,255,255,1);}.lQAHbd .OmQG5e{color: rgba(255,255,255,1);}.lQAHbd .NHD4Gf{color: rgba(255,255,255,1);}.lQAHbd .aw5Odc{color: rgba(255,255,255,1);}.lQAHbd .dhtgD:hover{color: rgba(255,255,255,1);}.lQAHbd .dhtgD:visited{color: rgba(255,255,255,1);}.lQAHbd .iwQgFb{background-color: rgba(255,255,255,0.150000006);}.lQAHbd .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .duRjpb .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .JYVBee .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .OmQG5e .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .CbiMKe{background-color: rgba(255,255,255,1);}.lQAHbd:before{background-color: rgba(30,108,147,1); display: block;}.cJgDec .zfr3Q{color: rgba(255,255,255,1);}.cJgDec .zfr3Q .OUGEr{color: rgba(255,255,255,1);}.cJgDec .qnVSj{color: rgba(255,255,255,1);}.cJgDec .Glwbz{color: rgba(255,255,255,1);}.cJgDec .qLrapd{color: rgba(255,255,255,1);}.cJgDec .aHM7ed{color: rgba(255,255,255,1);}.cJgDec .NHD4Gf{color: rgba(255,255,255,1);}.cJgDec .IFuOkc:before{background-color: rgba(33,33,33,1); opacity: 0; display: block;}.O13XJf{height: 340px; padding-bottom: 60px; padding-top: 60px;}.O13XJf .IFuOkc{background-color: rgba(34,110,147,1); background-image: url(https://ssl.gstatic.com/atari/images/simple-header-blended-small.png);}.O13XJf .IFuOkc:before{background-color: rgba(33,33,33,1); opacity: 0.4; display: block;}.O13XJf .zfr3Q{color: rgba(255,255,255,1);}.O13XJf .qnVSj{color: rgba(255,255,255,1);}.O13XJf .Glwbz{color: rgba(255,255,255,1);}.O13XJf .duRjpb{color: rgba(255,255,255,1);}.O13XJf .qLrapd{color: rgba(255,255,255,1);}.O13XJf .JYVBee{color: rgba(255,255,255,1);}.O13XJf .aHM7ed{color: rgba(255,255,255,1);}.O13XJf .OmQG5e{color: rgba(255,255,255,1);}.O13XJf .NHD4Gf{color: rgba(255,255,255,1);}.tpmmCb .zfr3Q{color: rgba(33,33,33,1);}.tpmmCb .zfr3Q .OUGEr{color: rgba(33,33,33,1);}.tpmmCb .qnVSj{color: rgba(33,33,33,1);}.tpmmCb .Glwbz{color: rgba(33,33,33,1);}.tpmmCb .qLrapd{color: rgba(33,33,33,1);}.tpmmCb .aHM7ed{color: rgba(33,33,33,1);}.tpmmCb .NHD4Gf{color: rgba(33,33,33,1);}.tpmmCb .IFuOkc:before{background-color: rgba(255,255,255,1); display: block;}.tpmmCb .Wew9ke{fill: rgba(33,33,33,1);}.aw5Odc{color: rgba(0,101,128,1);}.dhtgD:hover{color: rgba(0,122,147,1);}.dhtgD:active{color: rgba(0,122,147,1);}.dhtgD:visited{color: rgba(0,101,128,1);}.Zjiec{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 19pt; font-weight: 300; letter-spacing: 1px; line-height: 1.3; padding-bottom: 62.5px; padding-left: 48px; padding-right: 36px; padding-top: 11.5px;}.XMyrgf{margin-top: 0px; margin-left: 48px; margin-bottom: 24px; margin-right: 24px;}.TlfmSc{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 15pt; font-weight: 300; line-height: 1.333;}.Mz8gvb{color: rgba(255,255,255,1);}.zDUgLc{background-color: rgba(33,33,33,1);}.QTKDff.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.YTv4We{color: rgba(178,178,178,1);}.YTv4We:hover:before{background-color: rgba(255,255,255,0.1199999973); display: block;}.YTv4We.chg4Jd:focus:before{border-color: rgba(255,255,255,0.3600000143); display: block;}.eWDljc{background-color: rgba(33,33,33,1);}.eWDljc .hDrhEe{padding-left: 8px;}.ZXW7w{color: rgba(255,255,255,1); opacity: 0.26;}.PsKE7e{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 12pt; font-weight: 300;}.lhZOrc{color: rgba(73,170,212,1);}.hDrhEe:hover{color: rgba(73,170,212,1);}.M9vuGd{color: rgba(73,170,212,1); font-weight: 400;}.jgXgSe:hover{color: rgba(73,170,212,1);}.j10yRb:hover{color: rgba(0,188,212,1);}.j10yRb.chg4Jd:focus:before{border-color: rgba(255,255,255,0.3600000143); display: block;}.tCHXDc{color: rgba(255,255,255,1);}.iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.wgxiMe{background-color: rgba(33,33,33,1);}.fOU46b .TlfmSc{color: rgba(255,255,255,1);}.fOU46b .KJll8d{background-color: rgba(255,255,255,1);}.fOU46b .Mz8gvb{color: rgba(255,255,255,1);}.fOU46b .Mz8gvb.chg4Jd:focus:before{border-color: rgba(255,255,255,1); display: block;}.fOU46b .qV4dIc{color: rgba(255,255,255,0.8700000048);}.fOU46b .jgXgSe:hover{color: rgba(255,255,255,1);}.fOU46b .M9vuGd{color: rgba(255,255,255,1);}.fOU46b .tCHXDc{color: rgba(255,255,255,0.8700000048);}.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.fOU46b .G8QRnc .Mz8gvb{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .Mz8gvb.chg4Jd:focus:before{border-color: rgba(0,0,0,0.8000000119); display: block;}.fOU46b .G8QRnc .ZXW7w{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .TlfmSc{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .KJll8d{background-color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .qV4dIc{color: rgba(0,0,0,0.6399999857);}.fOU46b .G8QRnc .jgXgSe:hover{color: rgba(0,0,0,0.8199999928);}.fOU46b .G8QRnc .M9vuGd{color: rgba(0,0,0,0.8199999928);}.fOU46b .G8QRnc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .G8QRnc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .usN8rf .Mz8gvb{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .Mz8gvb.chg4Jd:focus:before{border-color: rgba(0,0,0,0.8000000119); display: block;}.fOU46b .usN8rf .ZXW7w{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .TlfmSc{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .KJll8d{background-color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .qV4dIc{color: rgba(0,0,0,0.6399999857);}.fOU46b .usN8rf .jgXgSe:hover{color: rgba(0,0,0,0.8199999928);}.fOU46b .usN8rf .M9vuGd{color: rgba(0,0,0,0.8199999928);}.fOU46b .usN8rf .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .usN8rf .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .aCIEDd .qV4dIc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .TlfmSc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .KJll8d{background-color: rgba(33,33,33,1);}.fOU46b .aCIEDd .ZXW7w{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .jgXgSe:hover{color: rgba(33,33,33,1); opacity: 0.82;}.fOU46b .aCIEDd .Mz8gvb{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .tCHXDc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}.fOU46b .a3ETed .qV4dIc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .TlfmSc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .KJll8d{background-color: rgba(255,255,255,1);}.fOU46b .a3ETed .ZXW7w{color: rgba(255,255,255,1);}.fOU46b .a3ETed .jgXgSe:hover{color: rgba(255,255,255,1); opacity: 0.82;}.fOU46b .a3ETed .Mz8gvb{color: rgba(255,255,255,1);}.fOU46b .a3ETed .tCHXDc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.XeSM4.b2Iqye.fOU46b .LBrwzc .tCHXDc{color: rgba(255,255,255,0.8700000048);}}.XeSM4.b2Iqye.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.KuNac.b2Iqye.fOU46b .tCHXDc{color: rgba(0,0,0,0.6399999857);}}.KuNac.b2Iqye.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .zDUgLc{opacity: 0;}.LBrwzc .ZXW7w{color: rgba(0,0,0,1);}.LBrwzc .KJll8d{background-color: rgba(0,0,0,1);}.GBy4H .ZXW7w{color: rgba(255,255,255,1);}.GBy4H .KJll8d{background-color: rgba(255,255,255,1);}.eBSUbc{background-color: rgba(33,33,33,1); color: rgba(0,188,212,0.6999999881);}.BFDQOb:hover{color: rgba(73,170,212,1);}.ImnMyf{background-color: rgba(255,255,255,1); color: rgba(33,33,33,1);}.Vs12Bd{background-color: rgba(242,242,242,1); color: rgba(33,33,33,1);}.S5d9Rd{background-color: rgba(30,108,147,1); color: rgba(255,255,255,1);}.zfr3Q{color: rgba(33,33,33,1); font-family: Lato, sans-serif; font-size: 11pt; font-weight: 400; line-height: 1.6667; margin-top: 12px;}.qnVSj{color: rgba(33,33,33,1);}.Glwbz{color: rgba(33,33,33,1);}.duRjpb{color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 34pt; font-weight: 300; letter-spacing: 0.5px; line-height: 1.2; margin-top: 30px;}.Ap4VC{margin-bottom: -30px;}.qLrapd{color: rgba(34,110,147,1);}.JYVBee{color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 19pt; font-weight: 400; line-height: 1.4; margin-top: 20px;}.CobnVe{margin-bottom: -20px;}.aHM7ed{color: rgba(34,110,147,1);}.OmQG5e{color: rgba(33,33,33,1); font-family: Lato, sans-serif; font-size: 15pt; font-style: normal; font-weight: 400; line-height: 1.25; margin-top: 16px;}.GV3q8e{margin-bottom: -16px;}.NHD4Gf{color: rgba(33,33,33,1);}.LB7kq .duRjpb{font-size: 64pt; letter-spacing: 2px; line-height: 1; margin-top: 40px;}.LB7kq .JYVBee{font-size: 25pt; font-weight: 300; line-height: 1.1; margin-top: 25px;}@media only screen and (max-width: 479px){.LB7kq .duRjpb{font-size: 40pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.LB7kq .duRjpb{font-size: 53pt;}}@media only screen and (max-width: 479px){.LB7kq .JYVBee{font-size: 19pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.LB7kq .JYVBee{font-size: 22pt;}}.O13XJf{height: 340px; padding-bottom: 60px; padding-top: 60px;}@media only screen and (min-width: 480px) and (max-width: 767px){.O13XJf{height: 280px; padding-bottom: 40px; padding-top: 40px;}}@media only screen and (max-width: 479px){.O13XJf{height: 250px; padding-bottom: 30px; padding-top: 30px;}}.SBrW1{height: 520px;}@media only screen and (min-width: 480px) and (max-width: 767px){.SBrW1{height: 520px;}}@media only screen and (max-width: 479px){.SBrW1{height: 400px;}}.Wew9ke{fill: rgba(255,255,255,1);}.gk8rDe{height: 180px; padding-bottom: 32px; padding-top: 60px;}.gk8rDe .zfr3Q{color: rgba(0,0,0,1);}.gk8rDe .duRjpb{color: rgba(34,110,147,1); font-size: 45pt; line-height: 1.1;}.gk8rDe .qLrapd{color: rgba(34,110,147,1);}.gk8rDe .JYVBee{color: rgba(34,110,147,1); font-size: 27pt; line-height: 1.35; margin-top: 15px;}.gk8rDe .aHM7ed{color: rgba(34,110,147,1);}.gk8rDe .OmQG5e{color: rgba(33,33,33,1);}.gk8rDe .NHD4Gf{color: rgba(33,33,33,1);}@media only screen and (max-width: 479px){.gk8rDe .duRjpb{font-size: 30pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .duRjpb{font-size: 38pt;}}@media only screen and (max-width: 479px){.gk8rDe .JYVBee{font-size: 20pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .JYVBee{font-size: 24pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe{padding-top: 45px;}}@media only screen and (max-width: 479px){.gk8rDe{padding-bottom: 0px; padding-top: 30px;}}.dhtgD{text-decoration: underline;}.JzO0Vc{background-color: rgba(33,33,33,1); font-family: Lato, sans-serif; width: 250px;}@media only screen and (min-width: 1280px){.JzO0Vc{padding-top: 48.5px;}}.TlfmSc{font-family: Lato, sans-serif; font-size: 15pt; font-weight: 300; line-height: 1.333;}.PsKE7e{font-family: Lato, sans-serif; font-size: 12pt;}.IKA38e{line-height: 1.21;}.hDrhEe{padding-bottom: 11.5px; padding-top: 11.5px;}.zDUgLc{opacity: 1;}.QmpIrf{background-color: rgba(30,108,147,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal; line-height: normal;}.KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.lQAHbd .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.lQAHbd .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.lQAHbd .Mt0nFe{border-color: rgba(255,255,255,0.200000003);}.cJgDec .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.cJgDec .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.tpmmCb .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.tpmmCb .KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.gk8rDe .QmpIrf{background-color: rgba(30,108,147,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.gk8rDe .KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.O13XJf .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.O13XJf .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.Y4CpGd{font-family: Lato, sans-serif; font-size: 11pt;}.CMArNe{background-color: rgba(242,242,242,1);}.LBrwzc .TlfmSc{color: rgba(0,0,0,0.8000000119);}.LBrwzc .YTv4We{color: rgba(0,0,0,0.6399999857);}.LBrwzc .YTv4We.chg4Jd:focus:before{border-color: rgba(0,0,0,0.6399999857); display: block;}.LBrwzc .Mz8gvb{color: rgba(0,0,0,0.6399999857);}.LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.LBrwzc .wgxiMe{background-color: rgba(255,255,255,1);}.LBrwzc .qV4dIc{color: rgba(0,0,0,0.6399999857);}.LBrwzc .M9vuGd{color: rgba(0,0,0,0.8000000119); font-weight: bold;}.LBrwzc .Zjiec{color: rgba(0,0,0,0.8000000119);}.LBrwzc .IKA38e{color: rgba(0,0,0,0.6399999857);}.LBrwzc .lhZOrc.IKA38e{color: rgba(0,0,0,0.8000000119); font-weight: bold;}.LBrwzc .j10yRb:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .eBSUbc{color: rgba(0,0,0,0.8000000119);}.LBrwzc .hDrhEe:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .jgXgSe:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .M9vuGd:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .zDUgLc{border-bottom-color: rgba(204,204,204,1); border-bottom-width: 1px; border-bottom-style: solid;}.fOU46b .LBrwzc .M9vuGd{color: rgba(0,0,0,0.8000000119);}.fOU46b .LBrwzc .jgXgSe:hover{color: rgba(0,0,0,0.8000000119);}.fOU46b .LBrwzc .zDUgLc{opacity: 1; border-bottom-style: none;}.fOU46b .LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .GBy4H .M9vuGd{color: rgba(255,255,255,1);}.fOU46b .GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.fOU46b .GBy4H .zDUgLc{opacity: 1;}.fOU46b .GBy4H .tCHXDc{color: rgba(255,255,255,0.8700000048);}.fOU46b .GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.XeSM4.G9Qloe.fOU46b .LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.XeSM4.G9Qloe.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.GBy4H .lhZOrc.IKA38e{color: rgba(255,255,255,1);}.GBy4H .eBSUbc{color: rgba(255,255,255,0.8700000048);}.GBy4H .hDrhEe:hover{color: rgba(255,255,255,1);}.GBy4H .j10yRb:hover{color: rgba(255,255,255,1);}.GBy4H .YTv4We{color: rgba(255,255,255,1);}.GBy4H .YTv4We.chg4Jd:focus:before{border-color: rgba(255,255,255,1); display: block;}.GBy4H .tCHXDc{color: rgba(255,255,255,0.8700000048);}.GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.GBy4H .M9vuGd{color: rgba(255,255,255,1);}.GBy4H .M9vuGd:hover{color: rgba(255,255,255,1);}.QcmuFb{padding-left: 20px;}.vDPrib{padding-left: 40px;}.TBDXjd{padding-left: 60px;}.bYeK8e{padding-left: 80px;}.CuqSDe{padding-left: 100px;}.Havqpe{padding-left: 120px;}.JvDrRe{padding-left: 140px;}.o5lrIf{padding-left: 160px;}.yOJW7c{padding-left: 180px;}.rB8cye{padding-left: 200px;}.RuayVd{padding-right: 20px;}.YzcKX{padding-right: 40px;}.reTV0b{padding-right: 60px;}.vSYeUc{padding-right: 80px;}.PxtZIe{padding-right: 100px;}.ahQMed{padding-right: 120px;}.rzhcXb{padding-right: 140px;}.PBhj0b{padding-right: 160px;}.TlN46c{padding-right: 180px;}.GEdNnc{padding-right: 200px;}.TMjjoe{font-family: Lato, sans-serif; font-size: 9pt; line-height: 1.2; margin-top: 0px;}@media only screen and (min-width: 1280px){.yxgWrb{margin-left: 250px;}}@media only screen and (max-width: 479px){.Zjiec{font-size: 15pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.Zjiec{font-size: 17pt;}}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12pt;}}@media only screen and (max-width: 479px){.duRjpb{font-size: 24pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.duRjpb{font-size: 29pt;}}@media only screen and (max-width: 479px){.JYVBee{font-size: 15pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.JYVBee{font-size: 17pt;}}@media only screen and (max-width: 479px){.OmQG5e{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.OmQG5e{font-size: 14pt;}}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12pt;}}@media only screen and (max-width: 479px){.TMjjoe{font-size: 9pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TMjjoe{font-size: 9pt;}}section[id="h.776dc02a570990a6_11"] .IFuOkc:before{opacity: 0.4;}section[id="h.402a7e521dfbaaa9_5"] .IFuOkc:before{opacity: 0.6;}section[id="h.776dc02a570990a6_37"] .IFuOkc:before{opacity: 0.0;}</style><script nonce="3Kdf6j9dMwjDEvAJ1hykDw">_at_config = [null,"AIzaSyChg3MFqzdi1P5J-YvEyakkSA1yU7HRcDI","897606708560-a63d8ia0t9dhtpdt4i3djab2m42see7o.apps.googleusercontent.com",null,null,null,null,null,null,null,null,null,null,null,"SITES_%s",null,null,null,null,null,null,null,null,null,["AHKXmL3fqJLIwi_NIR5NQSFT2OW_W8MScKUqMnMkanfut8wTMQemUiuYszjL6cmJWfGI0eek9hQ0",1,"COqUoqe58YkDFaoDbwYdJc8xGg",1732330312469097,[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747261,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94353368,94353376,94390153,94390161,94397741,94397749,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444282,94444290,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086181,95086189,95087186,95087194,95087217,95087225,95112873,95112881,95118561,95118569,95135933,95135941,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95266740,95266748,95270945,95270953,95271343,95271351,95314802,95314810,95317985,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101544667,101544675,101606928,101606936,101617516,101617524,101631040,101631048,101705089,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101922729,101922737]],null,null,null,null,0,null,null,null,null,null,null,null,null,null,"https://drive.google.com",null,null,null,null,null,null,null,null,null,0,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"v2internal","https://docs.google.com",null,null,null,null,null,null,"https://sites.google.com/new/",null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,"",null,null,null,null,null,null,null,null,null,null,null,null,6,null,null,"https://accounts.google.com/o/oauth2/auth","https://accounts.google.com/o/oauth2/postmessageRelay",null,null,null,null,78,"https://sites.google.com/new/?usp\u003dviewer_footer",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://www.gstatic.com/atari/embeds/83a60601c213b72fb19c1855fb0c5f26/intermediate-frame-minified.html",0,null,"v2beta",null,null,null,null,null,null,4,"https://accounts.google.com/o/oauth2/iframe",null,null,null,null,null,null,"https://1715807847-atari-embeds.googleusercontent.com/embeds/16cb204cf3a9d4d223a0a3fd8b0eec5d/inner-frame-minified.html",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://sites.google.com/view/wimnet-2023/accepted-papers",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,0,null,"",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,[1732330312469,"editors.sites-viewer-frontend_20241112.02_p1","695977640",null,1,1,""],null,null,null,null,0,null,null,0,null,null,null,null,null,null,null,null,20,500,"https://domains.google.com",null,0,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,1,0,1,0,0,0,0,null,null,null,null,null,"https://www.google.com/calendar/embed",null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,"PROD",0,null,0,null,1]; window.globals = {"enableAnalytics":true,"webPropertyId":"","showDebug":false,"hashedSiteId":"c4190601618598aa94c7c0439e5bef4cb72209ebc881a6feab96a1bf9f11bf7e","normalizedPath":"view/wimnet-2023/accepted-papers","pageTitle":"Accepted Papers"}; function gapiLoaded() {if (globals.gapiLoaded == undefined) {globals.gapiLoaded = true;} else {globals.gapiLoaded();}}window.messages = []; window.addEventListener && window.addEventListener('message', function(e) {if (window.messages && e.data && e.data.magic == 'SHIC') {window.messages.push(e);}});</script><script src="https://apis.google.com/js/client.js?onload=gapiLoaded" nonce="3Kdf6j9dMwjDEvAJ1hykDw"></script><script nonce="3Kdf6j9dMwjDEvAJ1hykDw">(function(){}).call(this); </script><script nonce="3Kdf6j9dMwjDEvAJ1hykDw">const imageUrl = 'https:\/\/lh4.googleusercontent.com\/8gGpO4HiqeABMUhaR3WiB9tBctOugALyiuYFFnH7MbBVkvveZ4mKYfdDoH4JNiAHQL5TW018KeiYEV_ZIsHqCmo\x3dw16383'; function bgImgLoaded() { if (!globals.headerBgImgLoaded) { globals.headerBgImgLoaded = new Date().getTime(); } else { globals.headerBgImgLoaded(); } } if (imageUrl) { const img = new Image(); img.src = imageUrl; img.onload = bgImgLoaded; globals.headerBgImgExists = true; } else { globals.headerBgImgExists = false; } </script></head><body dir="ltr" itemscope itemtype="http://schema.org/WebPage" id="yDmH0d" css="yDmH0d"><div jscontroller="pc62j" jsmodel="iTeaXe" jsaction="rcuQ6b:WYd;GvneHb:og1FDd;vbaUQc:uAM5ec;"><div id="docs-banner-container"><div id="docs-banners"><div id="HB1eCd-mzNpsf-r8s4j-ORHb"></div><div id="HB1eCd-TZk80d-r8s4j-ORHb" aria-live="assertive" aria-atomic="true"></div></div><div class="HB1eCd-Vkfede-NBtyUd-PvRhvb-LwH6nd"></div></div><div jscontroller="X4BaPc" jsaction="rcuQ6b:WYd;o6xM5b:Pg9eo;HuL2Hd:mHeCvf;VMhF5:FFYy5e;sk3Qmb:HI1Mdd;JIbuQc:rSzFEd(z2EeY),aSaF6e(ilzYPe);"><div jscontroller="o1L5Wb" data-sitename="wimnet-2023" data-search-scope="1" data-universe="1" jsmodel="fNFZH" jsaction="Pe9H6d:cZFEp;WMZaJ:VsGN3;hJluRd:UADL7b;zuqEgd:HI9w0;tr6QDd:Y8aXB;MxH79b:xDkBfb;JIbuQc:SPXMTb(uxAMZ),LjG1Ed(a6mxbb);" jsname="G0jgYd"><div jsname="gYwusb" class="p9b27"></div><div jscontroller="RrXLpc" jsname="XeeWQc" role="banner" jsaction="keydown:uiKYid(OH0EC);rcuQ6b:WYd;zuqEgd:ufqpf;JIbuQc:XfTnxb(lfEfFf),AlTiYc(GeGHKb),AlTiYc(m1xNUe),zZlNMe(pZn8Oc);YqO5N:ELcyfe;"><div jsname="bF1uUb" class="BuY5Fd" jsaction="click:xVuwSc;"></div><div jsname="MVsrn" class="TbNlJb "><div role="button" class="U26fgb mUbCce fKz7Od h3nfre M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="GeGHKb" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div><div class="E2UJ5" jsname="M6JdT"><div class="rFrNMe b7AJhc zKHdkd" jscontroller="pxq3x" jsaction="clickonly:KjsqPd; focus:Jt1EX; blur:fpfTEe; input:Lg5SV" jsshadow jsname="OH0EC" aria-expanded="true"><div class="aCsJod oJeWuf"><div class="aXBtI I0VJ4d Wic03c"><span jsslot class="A37UZe qgcB3c iHd5yb"><div role="button" class="U26fgb mUbCce fKz7Od i3PoXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="lfEfFf" aria-label="Search" aria-disabled="false" tabindex="0" data-tooltip="Search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div><div class="EmVfjc SKShhf" data-loadingmessage="Loading…" jscontroller="qAKInc" jsaction="animationend:kWijWc;dyRcpb:dyRcpb" jsname="aZ2wEe"><div class="Cg7hO" aria-live="assertive" jsname="vyyg5"></div><div jsname="Hxlbvc" class="xu46lf"><div class="ir3uv uWlRce co39ub"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv GFoASc Cn087"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv WpeOqd hfsr6b"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv rHV3jf EjXFBf"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div></div></div><div role="button" class="U26fgb mUbCce fKz7Od JyJRXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="m1xNUe" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div></span><div class="Xb9hP"><input type="search" class="whsOnd zHQkBf" jsname="YPqjbf" autocomplete="off" tabindex="0" aria-label="Search this site" value="" aria-disabled="false" autofocus role="combobox" data-initial-value=""/><div jsname="LwH6nd" class="ndJi5d snByac" aria-hidden="true">Search this site</div></div><span jsslot class="A37UZe sxyYjd MQL3Ob"><div role="button" class="U26fgb mUbCce fKz7Od Kk06A M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="pZn8Oc" aria-label="Clear search" aria-disabled="false" tabindex="0" data-tooltip="Clear search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="fAUEUd" viewBox="0 0 24 24" focusable="false"><path d="M19 6.41L17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12z"></path><path d="M0 0h24v24H0z" fill="none"></path></svg></span></span></div></span><div class="i9lrp mIZh1c"></div><div jsname="XmnwAc" class="OabDMe cXrdqd"></div></div></div><div class="LXRPh"><div jsname="ty6ygf" class="ovnfwe Is7Fhb"></div></div></div></div></div></div></div><div jsname="tiN4bf"><style nonce="RdCWz59YtR9tSO53Gi5Aww">.rrJNTc{opacity: 0;}.bKy5e{pointer-events: none; position: absolute; top: 0;}</style><div class="bKy5e"><div class="rrJNTc" tabindex="-1"><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jsname="z2EeY" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to main content</span></button></div><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf br90J" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf br90J" jsname="ilzYPe" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to navigation</span></button></div></div></div><div class="M63kCb N63NQ"></div><div class="QZ3zWd"><div class="fktJzd AKpWA fOU46b yMcSQd Ly6Unf G9Qloe XeSM4 XxIgdb" jsname="UzWXSb" data-uses-custom-theme="false" data-legacy-theme-name="QualityBasics" data-legacy-theme-font-kit="Light" data-legacy-theme-color-kit="Blue" jscontroller="Md9ENb" jsaction="gsiSmd:Ffcznf;yj5fUd:cpPetb;HNXL3:q0Vyke;e2SXKd:IPDu5e;BdXpgd:nhk7K;rcuQ6b:WYd;"><header id="atIdViewHeader"><div class="BbxBP HP6J1d K5Zlne" jsname="WA9qLc" jscontroller="RQOkef" jsaction="rcuQ6b:JdcaS;MxH79b:JdcaS;VbOlFf:ywL4Jf;FaOgy:ywL4Jf; keydown:Hq2uPe; wheel:Ut4Ahc;" data-top-navigation="true" data-is-preview="false"><div class="DXsoRd YTv4We oNsfjf" role="button" tabindex="0" jsaction="click:LUvzV" jsname="z4Tpl" id="s9iPrd" aria-haspopup="true" aria-controls="yuynLe" aria-expanded="false"><svg class="wFCWne" viewBox="0 0 24 24" stroke="currentColor" jsname="B1n9ub" focusable="false"><g transform="translate(12,12)"><path class="hlJH0" d="M-9 -5 L9 -5" fill="none" stroke-width="2"/><path class="HBu6N" d="M-9 0 L9 0" fill="none" stroke-width="2"/><path class="cLAGQe" d="M-9 5 L9 5" fill="none" stroke-width="2"/></g></svg></div><nav class="JzO0Vc" jsname="ihoMLd" role="navigation" tabindex="-1" id="yuynLe" jsaction="transitionend:UD2r5"><a class="XMyrgf" href="/view/wimnet-2023/home"><img src="https://lh4.googleusercontent.com/R_YK6aPWpFTpR6FkDvkedLEkFLWhS0no0d2E3JNQShThFC6kuocdRv-djDlOFCTKlUT6fA7VYdXOMQqRVXkwC2k=w16383" class="r9CsCb" role="img" aria-label="Site home"></a><a class="Zjiec oNsfjf" href="/view/wimnet-2023/home"><span>WiMNeT</span></a><ul class="jYxBte Fpy8Db" tabindex="-1"><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/home" data-url="/view/wimnet-2023/home" data-type="1" data-level="1">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/paper-submission" data-url="/view/wimnet-2023/paper-submission" data-type="1" data-level="1">Paper Submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/program-committee" data-url="/view/wimnet-2023/program-committee" data-type="1" data-level="1">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/wimnet-2023/accepted-papers" data-url="/view/wimnet-2023/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/venue" data-url="/view/wimnet-2023/venue" data-type="1" data-level="1">Venue</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/contact-us" data-url="/view/wimnet-2023/contact-us" data-type="1" data-level="1">Contact Us</a></div></div></li></ul></nav><div class="VLoccc K5Zlne QDWEj U8eYrb" jsname="rtFGi"><div class="Pvc6xe"><div jsname="I8J07e" class="TlfmSc YSH9J"><a class="GAuSPc" jsname="jIujaf" href="/view/wimnet-2023/home"><img src="https://lh4.googleusercontent.com/R_YK6aPWpFTpR6FkDvkedLEkFLWhS0no0d2E3JNQShThFC6kuocdRv-djDlOFCTKlUT6fA7VYdXOMQqRVXkwC2k=w16383" class="lzy1Td" role="img" aria-label="Site home" jsname="SwcDWb"><span class="QTKDff p46B7e">WiMNeT</span></a></div><nav class="plFg0c" jscontroller="HXO1uc" jsaction="rcuQ6b:rcuQ6b;MxH79b:CfS0pe;" id="WDxLfe" data-is-preview="false" style="visibility: hidden;" role="navigation" tabindex="-1"><ul jsname="waIgnc" class="K1Ci7d oXBWEc jYxBte"><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/home" data-url="/view/wimnet-2023/home" data-type="1" data-level="1">Home</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/paper-submission" data-url="/view/wimnet-2023/paper-submission" data-type="1" data-level="1">Paper Submission</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/program-committee" data-url="/view/wimnet-2023/program-committee" data-type="1" data-level="1">Program Committee</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J M9vuGd" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/wimnet-2023/accepted-papers" data-url="/view/wimnet-2023/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/venue" data-url="/view/wimnet-2023/venue" data-type="1" data-level="1">Venue</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/contact-us" data-url="/view/wimnet-2023/contact-us" data-type="1" data-level="1">Contact Us</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf ZmrVpf oXBWEc" more-menu-item jsaction="mouseenter:Vx8Jlb; mouseleave:ysDRUd"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-expanded="false" aria-haspopup="true" data-level="1">More</a><div class="mBHtvb u5fiyc" role="presentation" title="Expand/Collapse" jsaction="click:oESVTe" jsname="ix0Hvc"><svg class="dvmRw" viewBox="0 0 24 24" stroke="currentColor" jsname="HIH2V" focusable="false"><g transform="translate(9.7,12) rotate(45)"><path class="K4B8Y" d="M-4.2 0 L4.2 0" stroke-width="2"/></g><g transform="translate(14.3,12) rotate(-45)"><path class="MrYMx" d="M-4.2 0 L4.2 0" stroke-width="2"/></g></svg></div></div></div><div class="oGuwee eWDljc RPRy1e Mkt3Tc" style="display:none;" jsname="QXE97" jsaction="transitionend:SJBdh" role="group"><ul class="VcS63b"><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/home" data-url="/view/wimnet-2023/home" data-type="1" data-in-more-submenu="true" data-level="2">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/paper-submission" data-url="/view/wimnet-2023/paper-submission" data-type="1" data-in-more-submenu="true" data-level="2">Paper Submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/program-committee" data-url="/view/wimnet-2023/program-committee" data-type="1" data-in-more-submenu="true" data-level="2">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/wimnet-2023/accepted-papers" data-url="/view/wimnet-2023/accepted-papers" data-type="1" data-in-more-submenu="true" data-level="2">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/venue" data-url="/view/wimnet-2023/venue" data-type="1" data-in-more-submenu="true" data-level="2">Venue</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/wimnet-2023/contact-us" data-url="/view/wimnet-2023/contact-us" data-type="1" data-in-more-submenu="true" data-level="2">Contact Us</a></div></div></li></ul></div></li></ul></nav><div jscontroller="gK4msf" class="RBEWZc" jsname="h04Zod" jsaction="rcuQ6b:WYd;JIbuQc:AT95Ub;VbOlFf:HgE5D;FaOgy:HgE5D;MxH79b:JdcaS;" data-side-navigation="false"><div role="button" class="U26fgb mUbCce fKz7Od iWs3gf Wdnjke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="R9oOZd" aria-label="Open search bar" aria-disabled="false" tabindex="0" data-tooltip="Open search bar" aria-expanded="false" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe tCHXDc YSH9J" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div></div></div><div jsname="mADGA" class="zDUgLc"></div></div><div class="TxnWlb" jsname="BDdyze" jsaction="click:LUvzV"></div></div></header><div role="main" tabindex="-1" class="UtePc RCETm" dir="ltr"><section id="h.776dc02a570990a6_11" class="yaqOZd LB7kq cJgDec nyKByd O13XJf KEFykf" style=""><div class="Nu95r"><div class="IFuOkc" style="background-position: center center; background-image: url(https://lh4.googleusercontent.com/8gGpO4HiqeABMUhaR3WiB9tBctOugALyiuYFFnH7MbBVkvveZ4mKYfdDoH4JNiAHQL5TW018KeiYEV_ZIsHqCmo=w16383); background-size: cover;" jsname="LQX2Vd"></div></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-R6PoUb Ft7HRd-AhqUyc-R6PoUb JNdkSc SQVYQc L6cTce-purZT L6cTce-pSzOP"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"></div></div></div><div class="hJDwNd-AhqUyc-zQtlcf Ft7HRd-AhqUyc-zQtlcf purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.776dc02a570990a6_14" class="hJDwNd-AhqUyc-zQtlcf Ft7HRd-AhqUyc-zQtlcf jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe lkHyyc"><h3 id="h.v6n7vknardeq" dir="ltr" class="zfr3Q OmQG5e CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 3.46896; margin-bottom: 4.0pt; margin-left: 0.0pt; margin-right: 30.0pt; margin-top: 45.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: center; text-indent: 0.0pt;"><span class="C9DxTc " style="color: #ffffff; font-family: 'Times New Roman', Arial; font-size: 13.999999999999998pt; font-variant: normal; font-weight: 700; vertical-align: baseline;">10</span><span class="C9DxTc " style="color: #ffffff; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-variant: normal; font-weight: 700; vertical-align: super;">th</span><span class="C9DxTc " style="color: #ffffff; font-family: 'Times New Roman', Arial; font-size: 13.999999999999998pt; font-variant: normal; font-weight: 700; vertical-align: baseline;"> International Conference on Wireless and Mobile Network (WiMNeT 2023)</span></h3><p id="h.b9ivfmxkuryi" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.7999999999999998; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: center;"><span class="C9DxTc " style="color: #ffffff; font-family: 'Times New Roman', Arial; font-size: 12.0pt; font-variant: normal; font-weight: 700; vertical-align: baseline;">November 18 ~ 19, 2023, Zurich, Switzerland</span></p></div></div></div></div></div></div></div></div></div><div class="DnLU4" jsaction="JIbuQc:v5IJLd(ipHvib);"><div role="button" class="U26fgb mUbCce fKz7Od HqAAld Wew9ke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="ipHvib" aria-label="Scroll down" aria-disabled="false" tabindex="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="XE8yyf" viewBox="0 0 24 24" focusable="false"><path d="M7.41 7.84L12 12.42l4.59-4.58L18 9.25l-6 6-6-6z"/><path d="M0-.75h24v24H0z" fill="none"/></svg></span></span></div></div></section><section id="h.776dc02a570990a6_57" class="yaqOZd"><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.776dc02a570990a6_54" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p id="h.pzes2ky8y56h" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: center;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 13.999999999999998pt; font-weight: 700; vertical-align: baseline;">Accepted Papers</span></p></div></div></div></div></div></div></div></div></div></section><section id="h.776dc02a570990a6_61" class="yaqOZd"><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.776dc02a570990a6_58" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p id="h.x54oznc9uzv" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Full-song Scale Music Generation With Transformer-based Models</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Ruiyu Zhang and Shanshan Zhao, School of AI and Advanced Computing, XJTLU Entrepreneur College (Taicang),Xi’an Jiaotong-Liverpool University, Suzhou, China</span></p><p id="h.mprqpbvqupoe" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Creating a complex piece of art, such as music generation, necessitates actual creativity, which is dependent on several elements connected to the hierarchy of musical language. In recent years, music generation using Artificial Intelligence is a new domain that has received much attention. This project reviews the development of music generation and discuss the key factors of music composition for both Deep Machine Learning and human, where important deep-learning models and methods of music representation were covered. The objective of this project is to generate full-song music through some transformer-based models against the shortcomings of poorly structured music generated by some recurrent neural networks. We propose to integrate Compound Word music representation to multiple transformer-based models, including Linear Transformer, Compressive Transformer, and TransformerXL, along with Long Short-Term Memory model. The performances of different models are evaluated by training proposed models on the Pop1K7 music dataset. Meanwhile the generated music is evaluated in training process and music evaluation metrics, respectively. Finally, we demonstrate some selected decent full-song scale music generated by our models in a web page1.</span></p><p id="h.49s4or7x6e6o" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Deep learning; music generation; attention mechanism; music representation.</span></p><br><p id="h.mw9c9s6ld7hg" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Technologies for Information Use Prob-lems Solving</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Alexander S. Geyda, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 14 Line 39, St. Petersburg Russia</span></p><p id="h.8l0or95rq081" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The article is devoted to models, methods, and technologies required for solving problems related to the use of information in systems. These types of problems are, in general, a continuation and extension of Solows Paradox of Information technologies, which were described almost half a cen-tury ago. For example, such problems still arise during the Digital Transformation of Economy and Society or during the Sustainable Digital Development of Society. The solution to these problems requires the creation of models for the application of information in system functioning, with meth-ods applied based on available data. Once the information application is modelled, it is suggested to use a set of information technologies developed to solve these kinds of problems related to in-formation use. Candidates for such models, methods, and technologies will be considered.</span></p><p id="h.jc1rk3fms28l" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Information use, Information quality, Efficiency, Capability, Models, Methods, Technology.</span></p><br><p id="h.ij6w0snqbf7l" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Unmasking the Misconceptions: the Power of Test Design in Automation</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Rohit Khankhoje, Avon, Indiana, USA</span></p><p id="h.4vzy0fv2rr2k" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">This article explores the prevailing misconception in the realm of test automation the notion that automation harbors the exceptional potential to convert subpar test design into streamlined and dependable procedures.The paper highlights the inseparable connection between test design and successful test automation, emphasizing that the ef ectiveness of automation is dependent on the quality of the tests it automates. The paper argues that inadequate test design cannot be rectified by automation. By employing tangible instances from the real world and insightful perspectives that are applicable in practice, it emphasizes the importance of robust principles for designing tests. Additionally, it delves into the potential consequences that can arise from neglecting the design aspect of testing and of ers strategies for aligning test design with automation in order to maximize the ef ectiveness of testing endeavors. This paper serves as a cautionary message to the testing community, underscoring the fact that automation is merely a tool and not a universal solution. It further asserts that the key to success lies in establishing a solid foundation of well-crafted tests.</span></p><p id="h.yhs4496id8y9" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Test Automation , Test Design,Best Practices ,Ef iciency, Quality Assurance.</span></p><br><p id="h.1oqomwa6qoxu" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Cnn-optimized Text Recognition With Binary Embeddings for Arabic Expiry Date Recognition</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Mohamed Lotfy</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and Ghada Soliman</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Data Scientist, dept. Software Engineering, Kafr El-sheikh University, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Data Scientist Lead, dept. Environmental Engineering, Ain Shams University</span></p><p id="h.8n087t38tnfb" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Recognizing Arabic dot-matrix digits is a challenging problem due to the unique characteristics of dot-matrix fonts, such as irregular dot spacing and varying dot sizes. This paper presents an approach for recognizing Arabic digits printed in dot matrix format. The proposed model is based on Convolutional Neural Networks (CNN) that take the dot matrix as input and generate embeddings that are rounded to generate binary representations of the digits. The binary embeddings are then used to perform Optical Character Recognition (OCR) on the digit images. To overcome the challenge of the limited availability of dotted Arabic expiration date images, we developed a True Type Font (TTF) for generating synthetic images of Arabic dot-matrix characters. The model was trained on a synthetic dataset of 3287 images and 658 synthetic images for testing, representing realistic expiration dates from 2019 to 2027 in the format of yyyy/mm/dd. Our model achieved an accuracy of 98.94% on the expiry date recognition with Arabic dot matrix format using fewer parameters and less computational resources than traditional CNN-based models. By investigating and presenting our findings comprehensively, we aim to contribute substantially to the field of OCR and pave the way for advancements in Arabic dot-matrix character recognition. Our proposed approach is not limited to Arabic dot matrix digit recognition but can be also extended to text recognition tasks, such as text classification and sentiment analysis.</span></p><br><p id="h.np8ti94su3om" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Artificial Intelligence Aspect of Transportation Analysis Using Large Scale Systems</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Tiechuan Hu</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Wenbo Zhu</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, and Yuqi Yan</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, Johns Hopkins University, Baltimore, US, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, University of Chicago, Chicago, US, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Olin Business School, Washington University in St.Louis, Saint Louis, US</span></p><p id="h.ikvg1bqj2aau" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Modern transportation systems, based on large amounts of data, face the complex challenge of understanding the interaction between weather conditions and traf ic patterns. The emerging potential of artificial intelligence provides unprecedented opportunities to delve deeper into this dif icult problem [1]. This article leverages the synergistic power of advanced deep learning, natural language processing (NLP), and optimization technologies to conduct a comprehensive exploration. Our journey begins with real-time observational insights from convolutional neural networks (CNNs) and progresses to nuanced time series forecasts provided by long short-term memory networks (LSTMs). By leveraging transfer learning, we enrich our model by integrating pre-trained knowledge from relevant domains, thereby improving prediction accuracy. Sentiment analysis using BERT (Bidirectional Encoder Representations from Transformers), combined with semantic analysis of traf ic reports, provides a multi-dimensional view of traf ic dynamics. Advanced optimization techniques further refine our forecasts, ensuring they are not only accurate but also computationally ef icient. Our results illustrate the progressive increase in the predictive power of each ensemble technique. While highlighting the transformative potential of multifaceted AI approaches in transportation research, this article also highlights the promise of optimization and transfer learning in driving data-driven innovation. As we stand at the crossroads of deep learning, natural language processing, transfer learning, and transportation, this research provides a blueprint for leveraging these tools to shape the future of intelligent transportation systems.</span></p><p id="h.561ekd81btyb" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Performance Analysis, Sentiment Analysis, Machine Learning, Transfer learning.</span></p><br><p id="h.3ogt0krlsc2u" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Use Ofkappacoefficient Toevaluatecourtcaseclassificationsystem</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Leandro de Oliveira Ferreira</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Marcelo Lisboa Rocha</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, David Nadler Prata2andAngela Issa Haonat</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Court of Justice of the State of Tocantins (TJTO)-Tocantins, Brazil, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Graduate Program in Governance and Digital Transformation, UFT, Tocantins, Brazil</span></p><p id="h.uxt1417p1td2" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Each court case has its procedure determined by the classification of the subject matter that it deals with.Currently, the determination of the subject matter of a case is a manual task, depending on a court official to read the case and classify it according to a relevant subject matter. In order to automate thisprocess, the MinerJus was developed, which uses natural language processing techniques and the SVM machine learning technique for this purpose. This work aims to evaluate the level of agreement betweenthe classification of court cases with respect to their subject matter. For this, comparisons and subsequent evaluations were carried out between the classification of court cases provided by theoriginal MinerJus system (MinerJus SVM) and two jurists, against a new version of MinerJus using more sophisticated machine learning techniques (MinerJus XGBoost). To carry out this evaluation, the Kappaconcordance coefficient was used. It sought to verify if the system is able to classify court cases, based on their initial petition, according to the Unified Procedural Tables of the National Council of Justice, whichseeks to unify the form of classification regarding class and subject matter and procedural movements among Brazilian courts of justice. Despite many efforts for this uniformity, there are still manyclassification errors, due exclusively to human activity in this process. Therefore, a tool that can perform this task efficiently and speed up the judicial process has become essential. For this tool to be trulyefficient, it is necessary to evaluate the level of agreement, accuracy and precision of its analysis in relation to the cases. For this, the court cases were also analyzed by two jurists and the Kappaconcordance coefficient was applied to measure the level of agreement with the results presented by the original MinerJus (MinerJus SVM) and the new version of MinerJus (MinerJus XGBoost).</span></p><p id="h.ew0lepi0bmzb" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Artificial Intelligence. Court Case Classification & Kappa Coefficient.</span></p><br><p id="h.w84jq8a2tlgs" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Machine Learning Algorithms in Judiciary: an Extrajudicial Monitoring Application</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Harly Carreiro Varão</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Marcelo Lisboa Rocha</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Gentil Veloso Barbosa</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Angela Issa Haonat</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and David Nadler Prata</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Court of Justice of the State of Tocantins (TJTO)-Tocantins, Brazil, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Graduate Program in Governance and Digital Transformation, UFT, Tocantins, Brazil</span></p><p id="h.oe3vfxpq5215" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">In the judicial and extrajudicial spheres, the Tocantins Court of Justice (TJTO) - Brazil has achieved high levels of computerization. The conduct of such procedures requires transparency in this scenario. The analysis of data resulting from inspections of extrajudicial services is an aspect that needs attention with regard to extrajudicial services. To analyze data resulting from on-site extrajudicial inspections, a data mining technique based on association rules was proposed. Due to the large number of association rules in general, a second step was taken in order to optimize/reduce the number of rules. The proposed method performed better than other classic techniques of the literature, such as decision trees, Support Vector Machines, and Naive Bayes.</span></p><p id="h.orq3ie6yq5ls" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Association Rules, Data Mining, Extrajudicial Inspection & Optimization.</span></p><br><p id="h.cgosaj9x552v" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Covid-19 Chest X-ray Image Classificationusing Deeplearning</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Siwar Abdallah</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Manel Sekma</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and Wady Naanaa</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Higher Institute of Computer Sciences and Mathematics of Monastir, Monastir, Tunisia, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Higher Institute of Computer Sciences and Mathematics of Monastir, Monastir, Tunisia, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">University of Tunis El Manar</span></p><p id="h.tyg6qztt185" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The present method uses COVID-19 chest x-ray as an input to convolutional neural network (CNN), in addition non-negative matrix factorization (NMF) elements are used as an additional feature to improve the performance of the CNN model. The proposed method is tested on 2 public datasets collected from Kaggle and compared with CNN model equally to NMF for COVID-19 identification.</span></p><p id="h.3e16i0potbnq" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Non-Negative Matrix Factorization, Deep Learning, Covid-19 Chest X-Ray Classification.</span></p><br><p id="h.qzb4oxrltpi0" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Machine Learning Algorithms in Judiciary: an Extrajudicial Monitoring Application</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Harly Carreiro Varão</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Marcelo Lisboa Rocha</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Gentil Veloso Barbosa</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Angela Issa Haonat</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and David Nadler Prata</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Court of Justice of the State of Tocantins (TJTO)-Tocantins, Brazil, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Graduate Program in Governance and Digital Transformation, UFT, Tocantins, Brazil</span></p><p id="h.hce07vn645x3" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">In the judicial and extrajudicial spheres, the Tocantins Court of Justice (TJTO) - Brazil has achieved high levels of computerization. The conduct of such procedures requires transparency in this scenario. The analysis of data resulting from inspections of extrajudicial services is an aspect that needs attention with regard to extrajudicial services. To analyze data resulting from on-site extrajudicial inspections, a data mining technique based on association rules was proposed. Due to the large number of association rules in general, a second step was taken in order to optimize/reduce the number of rules. The proposed method performed better than other classic techniques of the literature, such as decision trees, Support Vector Machines, and Naive Bayes.</span></p><p id="h.z5un5x4ih11z" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Association Rules, Data Mining, Extrajudicial Inspection & Optimization.</span></p><br><p id="h.1rc4z7c5en4k" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Job Runtime Prediction: Categorization for Better Regression</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Rémi Lacaze-Labadie,Altair engineering,France</span></p><p id="h.xld45nq6scfc" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">In this work, we propose a solution to the problem of predicting job runtimes by improving the existing Predicting Query Runtime 2 (PQR2) approach. Our solution relies on two alternatives to PQR2 that include new mechanisms to solve identified PQR2 issues. First, we propose a fallback mechanism that uses a global regression model instead of a categorical regression model when confidence in first-phase categorization is below a given threshold. Second, we propose an extension mechanism to solve what we call the boundary problem of PQR2, where predictions of lower-than-average quality result when jobs are close to category borders. Finally, we propose two new optimization metrics specially adapted to regression problems with time intervals. We demonstrate using experimental results and comparison with PQR2 that our two alternatives can significantly improve the prediction accuracy. In addition, we show that our proposed extension mechanism can increase model performance up to 10%.</span></p><p id="h.tm21yxq8uotj" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Deep Learning, Machine Learning, Regression, Categorization, Job runtime, Optimization Metric.</span></p><br><p id="h.8fqnxyhmeosp" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Mental Health Testing and Exercise Intervention of Li and Han High School Students Under Heuristic and Artificial Intelligence Planning Strategies</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Ye Xiangdong</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Wang Fei</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Hao Wenting</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Zhang Yaling</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">4</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Zhu Xiaohui</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">5</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Hainan Vocational College of Political Science and Law,Haikou, Hainan571100China, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2, 4</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Hainan Normal University, Haikou, Hainan, 571158,China, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">,Hainan Institute of Trade,Haikou, Hainan, 571127,China, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">5</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">,Hainan Tropical Ocean College, Sanya, Hainan, 572000,China</span></p><p id="h.i7lpuq749sfl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">65 Li high school students and 99 Han high school students were randomly selected from 3 middle schools in Haikou City and Wuzhishan City of Hainan Province as research objects. scl-90 was used to test their mental health status, and according to the statistical inference of the data, artificial intelligence planning intervention strategies were proposed to achieve the purpose of mental health education.</span></p><p id="h.elo0fvr8tb1" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">heuristic; Artificial intelligence; Planning strategy; The Li nationality, living in Yunnan; The Han Nationality; Mental health.</span></p><br><p id="h.q9d2cznw2zv4" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Knowledge Transmission and the Concept of System in 18th C British Corpora</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">John Regan, Department of English, Royal Holloway, University of London, UK</span></p><p id="h.xxcgef9abggt" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">This study of knowledge transmission continues with the method used by Dr Regan in his book Semantic Change and Collective Knowledge in 18th C Britain, which was published by Bloomsbury in August 2023. What it means to transmit knowledge is always historically contingent. Across 18th C British corpora, significant evidence suggests that to ‘transmit knowledge’ meant to preserve what was known. As I will demonstrate, knowledge transmission was overwhelmingly ‘to posterity’. In this paper I will present information from the historical record about the terms within which this way of knowing was contextualised: reliable evidence of how most people possessed the concepts knowledge, posterity, memory, transmission and preservation. In presenting a significant amount of hitherto-unseen evidence about how these word-concepts were used, I will also explain in plain language how the measure of lexical association in this book works. In the second half of the paper, I will delve into the example of the word-concept system to chart that word’s remarkable semantic transformation, and its implications.</span></p><p id="h.fca7961pdcfe" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Corpus, semantic, change, episteme, collective knowledge, 18th C, Britain, ECCO, system, knowledge, posterity.</span></p><br><p id="h.rubf488v1czb" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Toward Identifying Customer Complaints of Microsoft Azure and Digital Ocean Cloud Service Providers Using Topic Modeling and Sentiment Analysis</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">SALEM ALGHAMDI, Institute of Public Administration, Saudi Arabia</span></p><p id="h.5al6pfdugpys" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Cloud computing has become a powerful tool recently, partly due to the high increase in the volume of data and demand for storage around the world. Cloud service providers present numerous advantages to their customers such as lower cost, and efficiency. This has exponentially increased demand. However, as they scale to meet the demands, they face a lot of challenges which reduces customer satisfaction. This paper presents an analysis of customer complaints in two major cloud services, Microsoft Azure, and DigitalOcean. The study aims to identify the common issues customers face while using cloud services and provide insights to the cloud providers for improving customer satisfaction. The study uses BERTopic for Topic Modeling and VADER Sentiment Analysis to better understand and cluster customer complaints. By examining the frequency of complaints, the study contributes to the existing literature on cloud computing and offers recommendations for enhancing the quality of cloud services.</span></p><p id="h.26ecrtux9tm6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Cloud Service Providers, Topic Modeling, Sentiment Analysis, Customer Complaints.</span></p><br><p id="h.t8pt5tz7w9nn" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">The European University Alliances Challenges and Acceleration Services Solutions</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Farnaz Haji Mohammadali</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and Jesus Alcober</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Network Engineering, Universitat politecnic de catalunya , Barcelona,Spain, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">C Esteve Terradas, 7, 08860 Castelldefels, Spain</span></p><p id="h.av896rp6dnl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">University alliances have appeared as leading mechanisms for promoting collaboration and addressing complex challenges in higher education. However, these alliances face numerous obstacles that must be understood and addressed to maximise their effectiveness. This paper aims to explore and synthesise existing research on the challenges encountered in university alliances. The review identifies key themes and provides insights into strategies that can help overcome these challenges. By understanding the challenges and potential solutions, universities and policymakers can enhance the effectiveness of alliances and foster fruitful collaborations. Currently, there are 44 university alliances that exist in European countries. These university alliances are established with different missions, and their goals are to meet their objectives. While these partners are gathered from different countries and backgrounds, there are obviously some challenges that exist in their partnership. As a result, we discuss how all these challenges have an effect on the sustainability of their partnerships and how projects such as aUPaEU can overcome some of these challenges.</span></p><p id="h.2rbid6pn881j" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Education, university alliance, challenges, partnership.</span></p><br><p id="h.y2h4fw9u4jrk" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Children Facing Earthquakes in Mexico City: an Educational Strategy to Promote Prevention Awareness</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Daniela Pérez-Sosa, Wulfrano Arturo Luna-Ramírez and Sara Margarita Bustamante-Loya, Universidad Autónoma Metropolitana-Cuajimalpa, Mexico</span></p><p id="h.q0iv3eertfgp" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Mexico is a country with high seismic activity, and its capital, Mexico City, is considered especially vulnerable due to its geographical characteristics, urbanization and dense population. In this context, risk awareness coupled with education focused on emergency and prevention management is key in minimizing the negative effects of such disasters. Increasing seismic preparation in the Mexican population requires disseminating solid theoretical knowledge in addition to actionable and practical recommendations, i.e. life-saving action protocols, as early as childhood. We focus on an educational strategy co-designed with children, through an agile development process, to promote preparedness via a meaningful communication system that is relevant and efficient. Our contribution is two-fold, namely: a workshop involving children, teachers, and emergency staff to encourage interest in risk prevention during earthquakes; and an autonomous and self-managing workshop manual that allows an iterative improvement each time it is performed as required by everyone involved.</span></p><p id="h.f19n4vgdjsr5" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Natural Disasters, Risk Preparedness, Co-design, Children, Adaptability, Risk Reduction, Security, Earthquakes.</span></p><br><p id="h.jhvj3otv7f2h" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Analyzing the Influence of Technostress on Students: a Systematic Literature Review</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Zahra Pourahmad and Hasan Ko¸c, Berlin International University of Applied Sciences Salzufer 6, 10587 Berlin Germany</span></p><p id="h.5v47f7goxygc" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Technostress is the stress experienced by individuals due to the use of technology. In today’s digital age, students are increasingly exposed to technology, which, with many benefits, can also lead to technostress. This can harm students’ overall well-being and academic performance. We thus argue that the impact of technology use on students should be better understood, and perform a systematic literature review (SLR), following the guidelines outlined in Okoli’s 8-step procedure. Reviewing the articles addressing technostress among students, the findings indicate that technostress can lead to decreased focus and concentration, impaired sleep patterns, social isolation, and a decline in mental health. It can also contribute to a negative attitude towards technology, hindering students’ ability to effectively leverage its potential for learning and productivity. The findings also suggest that the experience of stress is influenced by an individual’s perception of a stressful situation. Different individuals may perceive the same situation as stressful or non-stressful, depending on various factors such as time, place, and personal interpretation. This SLR provides a comprehensive and dependable resource for researchers, identifies existing research gaps, and proposes directions for future investigations.</span></p><p id="h.2nuisj7kgqra" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Technostress, Education, Systematic Literature Review, Students, ICT use.</span></p><br><p id="h.k3oymv8ewo1i" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Cybersecurity-enhanced Gamebased Learning for Clinical Decision-making: a Comparative Study</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Kelvin Ovabor</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Adeyinka Adams-Momoh</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Travis Atkison</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, University of Alabama, USA, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">School of Nursing, Western Illinois University, Illinois, USA, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, University of Alabama, USA</span></p><p id="h.t6p2u46i4jjk" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The purpose of this research is to determine whether medical professionals may benefit from gamebased learning to enhance their decision-making abilities. The research included 200 medical professionals from renowned institutions such as St. Peters Hospital Albany, MedStar Union Memorial Hospital, Baltimore, St. Vincent Charity Medical Center, Cleveland, and Kindred Hospital, Los Angeles, who had prior experience with game-based learning systems. Both a pre-and post-test assessing the participants ability to make difficult clinical decisions were done. Participants were exposed to an online game-based learning intervention available on MediSim Clinic, which offers a virtual simulation platform, and they demonstrated a considerable increase in their ability to make sound decisions. The results of the research provide preliminary evidence that game-based learning may be an efficient method for enhancing clinical decision-making abilities, including those related to cybersecurity challenges. Limitations and ideas for further research are presented, along with the studys consequences and recommendations for practice. This research contributes to the expanding literature on game-based learning and its potential for enhancing clinical decision-making abilities in the medical profession.</span></p><p id="h.f8dnjn98brqr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Game-based learning, Clinical Decision Making, cybersecurity Education.</span></p><br><p id="h.lm24piakol2e" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Threshold Key Storage via Fuzzy Extractors With Applications</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Ciarán Mullan, Adva Network Security GmbH</span></p><p id="h.iasgqem25yed" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">We present a threshold key storage scheme whereby user keys are derived from biometric fuzzy extractors. The work builds upon previous password-protected secret sharing constructions, yet removes requirements on users having to recall often forgotten or insecure credentials, i.e. low entropy passwords. In cases where password recovery is not possible, the scheme offers a new mechanism for online private key storage.</span></p><p id="h.tg1oh6bt1uee" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Key management, secret sharing, threshold cryptography, fuzzy extractors.</span></p><br><p id="h.c8fscb4cn02w" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Private and Secure Post-quantum Verifiable Random Function With Nizk Proof and Ring-lwe Encryption in Blockchain</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Bong Gon Kim</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Dennis Wong</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, and Yoon Seok Yang</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, Stony Brook University, New York, USA, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, Macao Polytechnic University, Macao, China, </span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, SUNY Korea University, Incheon, South Korea</span></p><p id="h.lc7w8c77lvim" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Full-song Scale Music Generation With Transformer-based Models</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Ruiyu Zhang and Shanshan Zhao, School of AI and Advanced Computing, XJTLU Entrepreneur College (Taicang),Xi’an Jiaotong-Liverpool University, Suzhou, China</span></p><p id="h.ydxmb25wdzhe" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Creating a complex piece of art, such as music generation, necessitates actual creativity, which is dependent on several elements connected to the hierarchy of musical language. In recent years, music generation using Artificial Intelligence is a new domain that has received much attention. This project reviews the development of music generation and discuss the key factors of music composition for both Deep Machine Learning and human, where important deep-learning models and methods of music representation were covered. The objective of this project is to generate full-song music through some transformer-based models against the shortcomings of poorly structured music generated by some recurrent neural networks. We propose to integrate Compound Word music representation to multiple transformer-based models, including Linear Transformer, Compressive Transformer, and TransformerXL, along with Long Short-Term Memory model. The performances of different models are evaluated by training proposed models on the Pop1K7 music dataset. Meanwhile the generated music is evaluated in training process and music evaluation metrics, respectively. Finally, we demonstrate some selected decent full-song scale music generated by our models in a web page1.</span></p><p id="h.ihff7e58tft2" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Deep learning; music generation; attention mechanism; music representation.</span></p><br><p id="h.e9ze3o93camu" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Technologies for Information Use Prob-lems Solving</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Alexander S. Geyda, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 14 Line 39, St. Petersburg Russia</span></p><p id="h.3sqrbyq5spww" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The article is devoted to models, methods, and technologies required for solving problems related to the use of information in systems. These types of problems are, in general, a continuation and extension of Solows Paradox of Information technologies, which were described almost half a cen-tury ago. For example, such problems still arise during the Digital Transformation of Economy and Society or during the Sustainable Digital Development of Society. The solution to these problems requires the creation of models for the application of information in system functioning, with meth-ods applied based on available data. Once the information application is modelled, it is suggested to use a set of information technologies developed to solve these kinds of problems related to in-formation use. Candidates for such models, methods, and technologies will be considered.</span></p><p id="h.2b4xn9xd8akl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Information use, Information quality, Efficiency, Capability, Models, Methods, Technology.</span></p><br><p id="h.hrte9u8ojkia" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Unmasking the Misconceptions: the Power of Test Design in Automation</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Rohit Khankhoje, Avon, Indiana, USA</span></p><p id="h.ukt8cg5x9t7b" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">This article explores the prevailing misconception in the realm of test automation the notion that automation harbors the exceptional potential to convert subpar test design into streamlined and dependable procedures.The paper highlights the inseparable connection between test design and successful test automation, emphasizing that the ef ectiveness of automation is dependent on the quality of the tests it automates. The paper argues that inadequate test design cannot be rectified by automation. By employing tangible instances from the real world and insightful perspectives that are applicable in practice, it emphasizes the importance of robust principles for designing tests. Additionally, it delves into the potential consequences that can arise from neglecting the design aspect of testing and of ers strategies for aligning test design with automation in order to maximize the ef ectiveness of testing endeavors. This paper serves as a cautionary message to the testing community, underscoring the fact that automation is merely a tool and not a universal solution. It further asserts that the key to success lies in establishing a solid foundation of well-crafted tests.</span></p><p id="h.bi49xib6jft5" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Test Automation , Test Design,Best Practices ,Ef iciency, Quality Assurance.</span></p><br><p id="h.8s4pt8yhomt" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Cnn-optimized Text Recognition With Binary Embeddings for Arabic Expiry Date Recognition</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Mohamed Lotfy</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and Ghada Soliman</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Data Scientist, dept. Software Engineering, Kafr El-sheikh University, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Data Scientist Lead, dept. Environmental Engineering, Ain Shams University</span></p><p id="h.lifewoi01z1u" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Recognizing Arabic dot-matrix digits is a challenging problem due to the unique characteristics of dot-matrix fonts, such as irregular dot spacing and varying dot sizes. This paper presents an approach for recognizing Arabic digits printed in dot matrix format. The proposed model is based on Convolutional Neural Networks (CNN) that take the dot matrix as input and generate embeddings that are rounded to generate binary representations of the digits. The binary embeddings are then used to perform Optical Character Recognition (OCR) on the digit images. To overcome the challenge of the limited availability of dotted Arabic expiration date images, we developed a True Type Font (TTF) for generating synthetic images of Arabic dot-matrix characters. The model was trained on a synthetic dataset of 3287 images and 658 synthetic images for testing, representing realistic expiration dates from 2019 to 2027 in the format of yyyy/mm/dd. Our model achieved an accuracy of 98.94% on the expiry date recognition with Arabic dot matrix format using fewer parameters and less computational resources than traditional CNN-based models. By investigating and presenting our findings comprehensively, we aim to contribute substantially to the field of OCR and pave the way for advancements in Arabic dot-matrix character recognition. Our proposed approach is not limited to Arabic dot matrix digit recognition but can be also extended to text recognition tasks, such as text classification and sentiment analysis.</span></p><br><p id="h.qexzk6eazbua" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Artificial Intelligence Aspect of Transportation Analysis Using Large Scale Systems</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Tiechuan Hu</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Wenbo Zhu</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, and Yuqi Yan</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, Johns Hopkins University, Baltimore, US, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, University of Chicago, Chicago, US, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Olin Business School, Washington University in St.Louis, Saint Louis, US</span></p><p id="h.c8cvhf9lq74k" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Modern transportation systems, based on large amounts of data, face the complex challenge of understanding the interaction between weather conditions and traf ic patterns. The emerging potential of artificial intelligence provides unprecedented opportunities to delve deeper into this dif icult problem [1]. This article leverages the synergistic power of advanced deep learning, natural language processing (NLP), and optimization technologies to conduct a comprehensive exploration. Our journey begins with real-time observational insights from convolutional neural networks (CNNs) and progresses to nuanced time series forecasts provided by long short-term memory networks (LSTMs). By leveraging transfer learning, we enrich our model by integrating pre-trained knowledge from relevant domains, thereby improving prediction accuracy. Sentiment analysis using BERT (Bidirectional Encoder Representations from Transformers), combined with semantic analysis of traf ic reports, provides a multi-dimensional view of traf ic dynamics. Advanced optimization techniques further refine our forecasts, ensuring they are not only accurate but also computationally ef icient. Our results illustrate the progressive increase in the predictive power of each ensemble technique. While highlighting the transformative potential of multifaceted AI approaches in transportation research, this article also highlights the promise of optimization and transfer learning in driving data-driven innovation. As we stand at the crossroads of deep learning, natural language processing, transfer learning, and transportation, this research provides a blueprint for leveraging these tools to shape the future of intelligent transportation systems.</span></p><p id="h.nax6qgpc0yp0" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Performance Analysis, Sentiment Analysis, Machine Learning, Transfer learning.</span></p><br><p id="h.bnmysnzbob8t" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Use Ofkappacoefficient Toevaluatecourtcaseclassificationsystem</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Leandro de Oliveira Ferreira</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Marcelo Lisboa Rocha</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, David Nadler Prata2andAngela Issa Haonat</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Court of Justice of the State of Tocantins (TJTO)-Tocantins, Brazil, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Graduate Program in Governance and Digital Transformation, UFT, Tocantins, Brazil</span></p><p id="h.t521eisknvv8" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Each court case has its procedure determined by the classification of the subject matter that it deals with.Currently, the determination of the subject matter of a case is a manual task, depending on a court official to read the case and classify it according to a relevant subject matter. In order to automate thisprocess, the MinerJus was developed, which uses natural language processing techniques and the SVM machine learning technique for this purpose. This work aims to evaluate the level of agreement betweenthe classification of court cases with respect to their subject matter. For this, comparisons and subsequent evaluations were carried out between the classification of court cases provided by theoriginal MinerJus system (MinerJus SVM) and two jurists, against a new version of MinerJus using more sophisticated machine learning techniques (MinerJus XGBoost). To carry out this evaluation, the Kappaconcordance coefficient was used. It sought to verify if the system is able to classify court cases, based on their initial petition, according to the Unified Procedural Tables of the National Council of Justice, whichseeks to unify the form of classification regarding class and subject matter and procedural movements among Brazilian courts of justice. Despite many efforts for this uniformity, there are still manyclassification errors, due exclusively to human activity in this process. Therefore, a tool that can perform this task efficiently and speed up the judicial process has become essential. For this tool to be trulyefficient, it is necessary to evaluate the level of agreement, accuracy and precision of its analysis in relation to the cases. For this, the court cases were also analyzed by two jurists and the Kappaconcordance coefficient was applied to measure the level of agreement with the results presented by the original MinerJus (MinerJus SVM) and the new version of MinerJus (MinerJus XGBoost).</span></p><p id="h.4pn8ws850eg1" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Artificial Intelligence. Court Case Classification & Kappa Coefficient.</span></p><br><p id="h.ys4a2rbh4pd4" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Machine Learning Algorithms in Judiciary: an Extrajudicial Monitoring Application</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Harly Carreiro Varão</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Marcelo Lisboa Rocha</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Gentil Veloso Barbosa</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Angela Issa Haonat</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and David Nadler Prata</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Court of Justice of the State of Tocantins (TJTO)-Tocantins, Brazil, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Graduate Program in Governance and Digital Transformation, UFT, Tocantins, Brazil</span></p><p id="h.kads60vusziz" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">In the judicial and extrajudicial spheres, the Tocantins Court of Justice (TJTO) - Brazil has achieved high levels of computerization. The conduct of such procedures requires transparency in this scenario. The analysis of data resulting from inspections of extrajudicial services is an aspect that needs attention with regard to extrajudicial services. To analyze data resulting from on-site extrajudicial inspections, a data mining technique based on association rules was proposed. Due to the large number of association rules in general, a second step was taken in order to optimize/reduce the number of rules. The proposed method performed better than other classic techniques of the literature, such as decision trees, Support Vector Machines, and Naive Bayes.</span></p><p id="h.ajxrdlbstofw" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Association Rules, Data Mining, Extrajudicial Inspection & Optimization.</span></p><br><p id="h.8glxhjhefk7r" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Covid-19 Chest X-ray Image Classificationusing Deeplearning</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Siwar Abdallah</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Manel Sekma</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and Wady Naanaa</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Higher Institute of Computer Sciences and Mathematics of Monastir, Monastir, Tunisia, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Higher Institute of Computer Sciences and Mathematics of Monastir, Monastir, Tunisia, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">University of Tunis El Manar</span></p><p id="h.6ezyx9orefoo" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The present method uses COVID-19 chest x-ray as an input to convolutional neural network (CNN), in addition non-negative matrix factorization (NMF) elements are used as an additional feature to improve the performance of the CNN model. The proposed method is tested on 2 public datasets collected from Kaggle and compared with CNN model equally to NMF for COVID-19 identification.</span></p><p id="h.iecge2cwicf4" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Non-Negative Matrix Factorization, Deep Learning, Covid-19 Chest X-Ray Classification.</span></p><br><p id="h.kbakfojm8ro" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Machine Learning Algorithms in Judiciary: an Extrajudicial Monitoring Application</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Harly Carreiro Varão</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Marcelo Lisboa Rocha</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Gentil Veloso Barbosa</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Angela Issa Haonat</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and David Nadler Prata</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Court of Justice of the State of Tocantins (TJTO)-Tocantins, Brazil, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Graduate Program in Governance and Digital Transformation, UFT, Tocantins, Brazil</span></p><p id="h.h9gv1mtqum16" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">In the judicial and extrajudicial spheres, the Tocantins Court of Justice (TJTO) - Brazil has achieved high levels of computerization. The conduct of such procedures requires transparency in this scenario. The analysis of data resulting from inspections of extrajudicial services is an aspect that needs attention with regard to extrajudicial services. To analyze data resulting from on-site extrajudicial inspections, a data mining technique based on association rules was proposed. Due to the large number of association rules in general, a second step was taken in order to optimize/reduce the number of rules. The proposed method performed better than other classic techniques of the literature, such as decision trees, Support Vector Machines, and Naive Bayes.</span></p><p id="h.3370im346vm" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Association Rules, Data Mining, Extrajudicial Inspection & Optimization.</span></p><br><p id="h.8j7rgpews1tu" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Job Runtime Prediction: Categorization for Better Regression</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Rémi Lacaze-Labadie,Altair engineering,France</span></p><p id="h.b3ules6xkpwc" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">In this work, we propose a solution to the problem of predicting job runtimes by improving the existing Predicting Query Runtime 2 (PQR2) approach. Our solution relies on two alternatives to PQR2 that include new mechanisms to solve identified PQR2 issues. First, we propose a fallback mechanism that uses a global regression model instead of a categorical regression model when confidence in first-phase categorization is below a given threshold. Second, we propose an extension mechanism to solve what we call the boundary problem of PQR2, where predictions of lower-than-average quality result when jobs are close to category borders. Finally, we propose two new optimization metrics specially adapted to regression problems with time intervals. We demonstrate using experimental results and comparison with PQR2 that our two alternatives can significantly improve the prediction accuracy. In addition, we show that our proposed extension mechanism can increase model performance up to 10%.</span></p><p id="h.rb3byf7rysii" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Deep Learning, Machine Learning, Regression, Categorization, Job runtime, Optimization Metric.</span></p><br><p id="h.7abrqiik0p77" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Mental Health Testing and Exercise Intervention of Li and Han High School Students Under Heuristic and Artificial Intelligence Planning Strategies</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Ye Xiangdong</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Wang Fei</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Hao Wenting</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Zhang Yaling</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">4</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Zhu Xiaohui</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">5</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Hainan Vocational College of Political Science and Law,Haikou, Hainan571100China, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2, 4</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Hainan Normal University, Haikou, Hainan, 571158,China, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">,Hainan Institute of Trade,Haikou, Hainan, 571127,China, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">5</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">,Hainan Tropical Ocean College, Sanya, Hainan, 572000,China</span></p><p id="h.pqncvefjkcb6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">65 Li high school students and 99 Han high school students were randomly selected from 3 middle schools in Haikou City and Wuzhishan City of Hainan Province as research objects. scl-90 was used to test their mental health status, and according to the statistical inference of the data, artificial intelligence planning intervention strategies were proposed to achieve the purpose of mental health education.</span></p><p id="h.nbzoubkj4k8b" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">heuristic; Artificial intelligence; Planning strategy; The Li nationality, living in Yunnan; The Han Nationality; Mental health.</span></p><br><p id="h.7al2i5xd6v05" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Knowledge Transmission and the Concept of System in 18th C British Corpora</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">John Regan, Department of English, Royal Holloway, University of London, UK</span></p><p id="h.mfiwfhewtmsf" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">This study of knowledge transmission continues with the method used by Dr Regan in his book Semantic Change and Collective Knowledge in 18th C Britain, which was published by Bloomsbury in August 2023. What it means to transmit knowledge is always historically contingent. Across 18th C British corpora, significant evidence suggests that to ‘transmit knowledge’ meant to preserve what was known. As I will demonstrate, knowledge transmission was overwhelmingly ‘to posterity’. In this paper I will present information from the historical record about the terms within which this way of knowing was contextualised: reliable evidence of how most people possessed the concepts knowledge, posterity, memory, transmission and preservation. In presenting a significant amount of hitherto-unseen evidence about how these word-concepts were used, I will also explain in plain language how the measure of lexical association in this book works. In the second half of the paper, I will delve into the example of the word-concept system to chart that word’s remarkable semantic transformation, and its implications.</span></p><p id="h.8pr4lyhfrwnh" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Corpus, semantic, change, episteme, collective knowledge, 18th C, Britain, ECCO, system, knowledge, posterity.</span></p><br><p id="h.f6c05ouabm5f" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Toward Identifying Customer Complaints of Microsoft Azure and Digital Ocean Cloud Service Providers Using Topic Modeling and Sentiment Analysis</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">SALEM ALGHAMDI, Institute of Public Administration, Saudi Arabia</span></p><p id="h.vxkl2rttv1l3" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Cloud computing has become a powerful tool recently, partly due to the high increase in the volume of data and demand for storage around the world. Cloud service providers present numerous advantages to their customers such as lower cost, and efficiency. This has exponentially increased demand. However, as they scale to meet the demands, they face a lot of challenges which reduces customer satisfaction. This paper presents an analysis of customer complaints in two major cloud services, Microsoft Azure, and DigitalOcean. The study aims to identify the common issues customers face while using cloud services and provide insights to the cloud providers for improving customer satisfaction. The study uses BERTopic for Topic Modeling and VADER Sentiment Analysis to better understand and cluster customer complaints. By examining the frequency of complaints, the study contributes to the existing literature on cloud computing and offers recommendations for enhancing the quality of cloud services.</span></p><p id="h.3uqcp4fmbvdd" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Cloud Service Providers, Topic Modeling, Sentiment Analysis, Customer Complaints.</span></p><br><p id="h.duffmynp928m" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">The European University Alliances Challenges and Acceleration Services Solutions</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Farnaz Haji Mohammadali</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;"> and Jesus Alcober</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Network Engineering, Universitat politecnic de catalunya , Barcelona,Spain, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">C Esteve Terradas, 7, 08860 Castelldefels, Spain</span></p><p id="h.cmdcohk69umq" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">University alliances have appeared as leading mechanisms for promoting collaboration and addressing complex challenges in higher education. However, these alliances face numerous obstacles that must be understood and addressed to maximise their effectiveness. This paper aims to explore and synthesise existing research on the challenges encountered in university alliances. The review identifies key themes and provides insights into strategies that can help overcome these challenges. By understanding the challenges and potential solutions, universities and policymakers can enhance the effectiveness of alliances and foster fruitful collaborations. Currently, there are 44 university alliances that exist in European countries. These university alliances are established with different missions, and their goals are to meet their objectives. While these partners are gathered from different countries and backgrounds, there are obviously some challenges that exist in their partnership. As a result, we discuss how all these challenges have an effect on the sustainability of their partnerships and how projects such as aUPaEU can overcome some of these challenges.</span></p><p id="h.pgikda6q280y" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Education, university alliance, challenges, partnership.</span></p><br><p id="h.12j52a8h516k" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Children Facing Earthquakes in Mexico City: an Educational Strategy to Promote Prevention Awareness</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Daniela Pérez-Sosa, Wulfrano Arturo Luna-Ramírez and Sara Margarita Bustamante-Loya, Universidad Autónoma Metropolitana-Cuajimalpa, Mexico</span></p><p id="h.ab8vwynquqjo" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Mexico is a country with high seismic activity, and its capital, Mexico City, is considered especially vulnerable due to its geographical characteristics, urbanization and dense population. In this context, risk awareness coupled with education focused on emergency and prevention management is key in minimizing the negative effects of such disasters. Increasing seismic preparation in the Mexican population requires disseminating solid theoretical knowledge in addition to actionable and practical recommendations, i.e. life-saving action protocols, as early as childhood. We focus on an educational strategy co-designed with children, through an agile development process, to promote preparedness via a meaningful communication system that is relevant and efficient. Our contribution is two-fold, namely: a workshop involving children, teachers, and emergency staff to encourage interest in risk prevention during earthquakes; and an autonomous and self-managing workshop manual that allows an iterative improvement each time it is performed as required by everyone involved.</span></p><p id="h.8bri9rw0i9u3" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Natural Disasters, Risk Preparedness, Co-design, Children, Adaptability, Risk Reduction, Security, Earthquakes.</span></p><br><p id="h.83ppmqpi96qe" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Analyzing the Influence of Technostress on Students: a Systematic Literature Review</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Zahra Pourahmad and Hasan Ko¸c, Berlin International University of Applied Sciences Salzufer 6, 10587 Berlin Germany</span></p><p id="h.e27r4ainxlkb" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Technostress is the stress experienced by individuals due to the use of technology. In today’s digital age, students are increasingly exposed to technology, which, with many benefits, can also lead to technostress. This can harm students’ overall well-being and academic performance. We thus argue that the impact of technology use on students should be better understood, and perform a systematic literature review (SLR), following the guidelines outlined in Okoli’s 8-step procedure. Reviewing the articles addressing technostress among students, the findings indicate that technostress can lead to decreased focus and concentration, impaired sleep patterns, social isolation, and a decline in mental health. It can also contribute to a negative attitude towards technology, hindering students’ ability to effectively leverage its potential for learning and productivity. The findings also suggest that the experience of stress is influenced by an individual’s perception of a stressful situation. Different individuals may perceive the same situation as stressful or non-stressful, depending on various factors such as time, place, and personal interpretation. This SLR provides a comprehensive and dependable resource for researchers, identifies existing research gaps, and proposes directions for future investigations.</span></p><p id="h.wpha7ewqhr5x" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Technostress, Education, Systematic Literature Review, Students, ICT use.</span></p><br><p id="h.3k416jn6mj9s" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Cybersecurity-enhanced Gamebased Learning for Clinical Decision-making: a Comparative Study</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Kelvin Ovabor</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Adeyinka Adams-Momoh</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Travis Atkison</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, University of Alabama, USA, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">School of Nursing, Western Illinois University, Illinois, USA, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, University of Alabama, USA</span></p><p id="h.t4mky5g7v9l7" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The purpose of this research is to determine whether medical professionals may benefit from gamebased learning to enhance their decision-making abilities. The research included 200 medical professionals from renowned institutions such as St. Peters Hospital Albany, MedStar Union Memorial Hospital, Baltimore, St. Vincent Charity Medical Center, Cleveland, and Kindred Hospital, Los Angeles, who had prior experience with game-based learning systems. Both a pre-and post-test assessing the participants ability to make difficult clinical decisions were done. Participants were exposed to an online game-based learning intervention available on MediSim Clinic, which offers a virtual simulation platform, and they demonstrated a considerable increase in their ability to make sound decisions. The results of the research provide preliminary evidence that game-based learning may be an efficient method for enhancing clinical decision-making abilities, including those related to cybersecurity challenges. Limitations and ideas for further research are presented, along with the studys consequences and recommendations for practice. This research contributes to the expanding literature on game-based learning and its potential for enhancing clinical decision-making abilities in the medical profession.</span></p><p id="h.28tvtjgixil4" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Game-based learning, Clinical Decision Making, cybersecurity Education.</span></p><br><p id="h.hsfcatnkgaab" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Threshold Key Storage via Fuzzy Extractors With Applications</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Ciarán Mullan, Adva Network Security GmbH</span></p><p id="h.ull3pz54vdb2" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">We present a threshold key storage scheme whereby user keys are derived from biometric fuzzy extractors. The work builds upon previous password-protected secret sharing constructions, yet removes requirements on users having to recall often forgotten or insecure credentials, i.e. low entropy passwords. In cases where password recovery is not possible, the scheme offers a new mechanism for online private key storage.</span></p><p id="h.fv6r8plpm74q" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Key management, secret sharing, threshold cryptography, fuzzy extractors.</span></p><br><p id="h.b1i2wzp6bynn" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Private and Secure Post-quantum Verifiable Random Function With Nizk Proof and Ring-lwe Encryption in Blockchain</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Bong Gon Kim</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, Dennis Wong</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, and Yoon Seok Yang</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, Stony Brook University, New York, USA, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, Macao Polytechnic University, Macao, China, </span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 8.4pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, SUNY Korea University, Incheon, South Korea</span></p><p id="h.42xtz9bz0lnr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">In this study, we present a secure smart contract-based Verifiable Random Function (VRF) model, addressing the shortcomings of existing systems. As quantum computing emerges, conventional public key cryptography faces potential vulnerabilities. To enhance our VRF’s robustness, we employ post-quantum Ring-LWE encryption for generating pseudo-random sequences. Given the computational intensity of this approach and associated onchain gas costs, we propose a hybrid architecture of VRF system where onchain and offchain can communicate in a scalable and secure way. We employ a unique ring signature scheme with NIZK proof and also delegated key generation, inspired by Chaum-Pedersen proof of logarithm equalty and Fiat-Shamir Heuristic. Our decentralized VRF employs multi-party computation (MPC) with blockchain-based decentralized identifiers (DID), ensuring enhanced randomness and security. We show the security and privacy advantages of our proposed VRF model with approximated estimation of overall time and space complexities. We also evaluate our VRF MPC model’s entropy and outline its Solidity smart contract integration. This research also provides a method to produce and verify the VRF output’s proof, optimal for scenarios necessitating randomness and validation. Lastly, using NIST SP800-22 test suite for randomness, we demonstrate the commendable result with 98.86% of overall pass rate on 11 standard tests and 0.5459 of average p-value for the total 176 tests.</span></p><p id="h.324ywv3p5vk6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Ring-LWE, Verifiable Random Function, DID, MPC, Blockchain, Smart Contract, Ring Signature, Entropy, NIZK proo.</span></p><br><p id="h.y98izccn5be1" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Trust-based Approaches Towards Enhancing Iot Security: a Systematic Literature Review</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Oghenetejiri Okporokpo, Funminiyi Olajide, Nemitari Ajienka and Xiaoqi Ma, Department of Computer Science, Nottingham Trent University, Clifton Lane, Nottingham NG11 8NS</span></p><p id="h.mm092l76m1t6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The continuous rise in the adoption of emerging technologies such as Internet of Things (IoT) by businesses has brought unprecedented opportunities for innovation and growth. However, due to the distinct characteristics of these emerging IoT technologies like real-time data processing, Self-configuration, interoperability, and scalability, they have also introduced some unique cybersecurity challenges, such as malware attacks, advanced persistent threats (APTs), DoS /DDoS (Denial of Service & Distributed Denial of Service attacks) and insider threats. As a result of these challenges, there is an increased need for improved cybersecurity approaches and efficient management solutions to ensure the privacy and security of communication within IoT networks. One proposed security approach is the utilization of trust-based systems and is the focus of this study. This research paper presents a systematic literature review on the Trust-based cybersecurity security approaches for IoT. A total of 23 articles were identified that satisfy the review criteria. We highlighted the common trust-based mitigation techniques in existence for dealing with these threats and grouped them into three major categories, namely: Observation-Based, Knowledge-Based & Cluster-Based systems. Finally, several open issues were highlighted, and future research directions presented.</span></p><p id="h.lgl0btz0ygc7" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">IoT Networks, Internet of Things (IoT), Trust, Privacy, Cybersecurity & IoT Security.</span></p><br><p id="h.5v1membbknhf" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Preserving Confidential Information: a Comprehensive Analysis of Security and Privacy Concerns in Internet of Things (Iot) Systems</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Elshan Tanriverdiyev, National Defense University of the Ministry of Defense of the Republic of Azerbaijan</span></p><p id="h.lxz19bypdgl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The Internet of Things (IoT) is a wireless network that facilitates data exchange among smart nodes (IoT devices). While IoT technology has enabled improved communication and smart systems, it has also become a target for attackers seeking to exploit users sensitive information. This survey paper highlights security and privacy issues within IoT systems, supported by a literature review of related research. The paper delves into security attacks, categorizing them into layer attacks, providing a detailed analysis within the context of IoT layers. Additionally, it presents potential solutions and strategies to safeguard IoT systems against threats. This comprehensive overview aims to shed light on IoT security challenges and offer insights into protecting these systems from potential attacks.</span></p><p id="h.rvlbw88xml6h" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Internet of Things, IoT, IoT Systems, RFID, WSN, IoT Security Issues, IoT Security Attacks.</span></p><br><p id="h.t8iuns1c6p6a" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Lightweight Public Key Encryption in Post-quantum Computing Era</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Peter Hillmann, University of the Bundeswehr Munich, Department of Computer Science, Werner-Heisenberg-Weg 39, 85577 Neubiberg, Germany</span></p><p id="h.7purymxr3tly" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 400; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Confidentiality in our digital world is based on the security of cryptographic algorithms. These are usually executed transparently in the background, with people often relying on them without further knowledge. In the course of technological progress with quantum computers, the protective function of common encryption algorithms is threatened. This particularly affects public-key methods such as RSA and DH based on discrete logarithms and prime factorization. Our concept describes the transformation of a classical asymmetric encryption method to a modern complexity class. Thereby the approach of Cramer-Shoup is put on the new basis of elliptic curves. The system is provable cryptographically strong, especially against adaptive chosen-ciphertext attacks. In addition, the new method features small key lengths, making it suitable for Internet-of-Things. It represents an intermediate step towards an encryption scheme based on isogeny elliptic curves. This approach shows a way to a secure encryption scheme for the post-quantum computing era.</span></p><p id="h.snoelky2799h" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Cryptography, Public-Key Encryption, Post-Quantum Cryptography, Elliptic Curve, Isogeny Curve.</span></p><br><p id="h.ubbelmvg7356" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Quantifying Success: Measuring Roi in Test Automation</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Rohit Khankhoje, Indianapolis, USA</span></p><p id="h.66g0dy3mm10l" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: Roboto, Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The strategic decision to implement test automation is a favored approach for organizations seeking to improve the quality of their software, expedite delivery, and mitigate testing expenses. In order to make this decision with precision, it is imperative to accurately assess the return on investment (ROI) of test automation. The present paper , titled "Quantifying Success: Measuring ROI in Test Automation," delves deeply into the fundamental aspects of ROI evaluation within the realm of test automation. It outlines the methodology behind ROI calculation, explores the cost factors and advantages associated with automation, and sheds light on the optimal strategies for achieving a favorable ROI. By presenting real-world case studies and examples, this paper ef ectively demonstrates the practical application of ROI measurement in test automation, The formula for Return on Investment (ROI) typically falls under the category of being "basic". While costs are relatively simple to measure, assessing the worth of potential advantages proves to be considerably more challenging. Approaches to calculating ROI often oversimplify various aspects of test automation, subsequently resulting in inaccurate outcomes. These inaccuracies, in turn, foster impractical expectations among management in relation to test automation, ultimately culminating in failure at individual, team, and occasionally project levels. thereby of ering valuable insights to organizations seeking to optimize the ef icacy of their testing endeavors.</span></p><br><br><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">In this study, we present a secure smart contract-based Verifiable Random Function (VRF) model, addressing the shortcomings of existing systems. As quantum computing emerges, conventional public key cryptography faces potential vulnerabilities. To enhance our VRF’s robustness, we employ post-quantum Ring-LWE encryption for generating pseudo-random sequences. Given the computational intensity of this approach and associated onchain gas costs, we propose a hybrid architecture of VRF system where onchain and offchain can communicate in a scalable and secure way. We employ a unique ring signature scheme with NIZK proof and also delegated key generation, inspired by Chaum-Pedersen proof of logarithm equalty and Fiat-Shamir Heuristic. Our decentralized VRF employs multi-party computation (MPC) with blockchain-based decentralized identifiers (DID), ensuring enhanced randomness and security. We show the security and privacy advantages of our proposed VRF model with approximated estimation of overall time and space complexities. We also evaluate our VRF MPC model’s entropy and outline its Solidity smart contract integration. This research also provides a method to produce and verify the VRF output’s proof, optimal for scenarios necessitating randomness and validation. Lastly, using NIST SP800-22 test suite for randomness, we demonstrate the commendable result with 98.86% of overall pass rate on 11 standard tests and 0.5459 of average p-value for the total 176 tests.</span></p><p id="h.7emwsr72vvnf" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Ring-LWE, Verifiable Random Function, DID, MPC, Blockchain, Smart Contract, Ring Signature, Entropy, NIZK proo.</span></p><br><p id="h.xgngnp1n0akp" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Trust-based Approaches Towards Enhancing Iot Security: a Systematic Literature Review</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Oghenetejiri Okporokpo, Funminiyi Olajide, Nemitari Ajienka and Xiaoqi Ma, Department of Computer Science, Nottingham Trent University, Clifton Lane, Nottingham NG11 8NS</span></p><p id="h.j931qqrf93wm" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The continuous rise in the adoption of emerging technologies such as Internet of Things (IoT) by businesses has brought unprecedented opportunities for innovation and growth. However, due to the distinct characteristics of these emerging IoT technologies like real-time data processing, Self-configuration, interoperability, and scalability, they have also introduced some unique cybersecurity challenges, such as malware attacks, advanced persistent threats (APTs), DoS /DDoS (Denial of Service & Distributed Denial of Service attacks) and insider threats. As a result of these challenges, there is an increased need for improved cybersecurity approaches and efficient management solutions to ensure the privacy and security of communication within IoT networks. One proposed security approach is the utilization of trust-based systems and is the focus of this study. This research paper presents a systematic literature review on the Trust-based cybersecurity security approaches for IoT. A total of 23 articles were identified that satisfy the review criteria. We highlighted the common trust-based mitigation techniques in existence for dealing with these threats and grouped them into three major categories, namely: Observation-Based, Knowledge-Based & Cluster-Based systems. Finally, several open issues were highlighted, and future research directions presented.</span></p><p id="h.4les98cg46ih" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">IoT Networks, Internet of Things (IoT), Trust, Privacy, Cybersecurity & IoT Security.</span></p><br><p id="h.gewxykoseriy" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Preserving Confidential Information: a Comprehensive Analysis of Security and Privacy Concerns in Internet of Things (Iot) Systems</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Elshan Tanriverdiyev, National Defense University of the Ministry of Defense of the Republic of Azerbaijan</span></p><p id="h.iwbv72v9y7p" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The Internet of Things (IoT) is a wireless network that facilitates data exchange among smart nodes (IoT devices). While IoT technology has enabled improved communication and smart systems, it has also become a target for attackers seeking to exploit users sensitive information. This survey paper highlights security and privacy issues within IoT systems, supported by a literature review of related research. The paper delves into security attacks, categorizing them into layer attacks, providing a detailed analysis within the context of IoT layers. Additionally, it presents potential solutions and strategies to safeguard IoT systems against threats. This comprehensive overview aims to shed light on IoT security challenges and offer insights into protecting these systems from potential attacks.</span></p><p id="h.aemuqvpze9j0" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Internet of Things, IoT, IoT Systems, RFID, WSN, IoT Security Issues, IoT Security Attacks.</span></p><br><p id="h.fba264nixa9c" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Lightweight Public Key Encryption in Post-quantum Computing Era</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Peter Hillmann, University of the Bundeswehr Munich, Department of Computer Science, Werner-Heisenberg-Weg 39, 85577 Neubiberg, Germany</span></p><p id="h.gs7q71yk0spy" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Confidentiality in our digital world is based on the security of cryptographic algorithms. These are usually executed transparently in the background, with people often relying on them without further knowledge. In the course of technological progress with quantum computers, the protective function of common encryption algorithms is threatened. This particularly affects public-key methods such as RSA and DH based on discrete logarithms and prime factorization. Our concept describes the transformation of a classical asymmetric encryption method to a modern complexity class. Thereby the approach of Cramer-Shoup is put on the new basis of elliptic curves. The system is provable cryptographically strong, especially against adaptive chosen-ciphertext attacks. In addition, the new method features small key lengths, making it suitable for Internet-of-Things. It represents an intermediate step towards an encryption scheme based on isogeny elliptic curves. This approach shows a way to a secure encryption scheme for the post-quantum computing era.</span></p><p id="h.pwggyhgi6uzp" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">Cryptography, Public-Key Encryption, Post-Quantum Cryptography, Elliptic Curve, Isogeny Curve.</span></p><br><p id="h.am1krmxdwy3d" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">Quantifying Success: Measuring Roi in Test Automation</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 11.5pt; font-weight: 400; vertical-align: baseline;">Rohit Khankhoje, Indianapolis, USA</span></p><p id="h.7aekx6tlqclg" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4353999999999996; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0.0pt; margin-top: 0.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 400; vertical-align: baseline;">The strategic decision to implement test automation is a favored approach for organizations seeking to improve the quality of their software, expedite delivery, and mitigate testing expenses. In order to make this decision with precision, it is imperative to accurately assess the return on investment (ROI) of test automation. The present paper , titled "Quantifying Success: Measuring ROI in Test Automation," delves deeply into the fundamental aspects of ROI evaluation within the realm of test automation. It outlines the methodology behind ROI calculation, explores the cost factors and advantages associated with automation, and sheds light on the optimal strategies for achieving a favorable ROI. By presenting real-world case studies and examples, this paper ef ectively demonstrates the practical application of ROI measurement in test automation, The formula for Return on Investment (ROI) typically falls under the category of being "basic". While costs are relatively simple to measure, assessing the worth of potential advantages proves to be considerably more challenging. Approaches to calculating ROI often oversimplify various aspects of test automation, subsequently resulting in inaccurate outcomes. These inaccuracies, in turn, foster impractical expectations among management in relation to test automation, ultimately culminating in failure at individual, team, and occasionally project levels. thereby of ering valuable insights to organizations seeking to optimize the ef icacy of their testing endeavors.</span></p><br><br></div></div></div></div></div></div></div></div></div></section><section id="h.402a7e521dfbaaa9_5" class="yaqOZd cJgDec nyKByd" style=""><div class="IFuOkc" style="background-position: center center; background-image: url(https://lh3.googleusercontent.com/5_RDUOBTniUpM6sylXO172M265ynvqQ6vOrZa0fM_cHeUikTVYACGX3kzCmIeUD8-c3LJsrZeSGlD_QdWq_1aeM=w16383); background-size: cover;"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.402a7e521dfbaaa9_8" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 3.0; margin-bottom: 11.0pt; margin-left: 15.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-indent: 0.0pt;"><a class="XqQF9c" href="https://comit2023.org/wimnet/contact" target="_blank" style="color: inherit; text-decoration: none;"><span class="C9DxTc " style="color: #ffffff; font-family: 'Times New Roman', Arial; font-size: 12.0pt; font-variant: normal; font-weight: 700; vertical-align: baseline;">Contact</span></a></p><p dir="ltr" class="zfr3Q CDt4Ke " style="text-align: left;"><a class="XqQF9c" href="mailto:wimnetconfe@gmail.com" target="_blank" style="color: inherit; text-decoration: none;"><span class="C9DxTc aw5Odc " style="font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-variant: normal; font-weight: 700; text-decoration: underline; vertical-align: baseline;">wimnetconfe@gmail.com</span><span class="C9DxTc aw5Odc " style="font-family: 'Times New Roman', Arial; font-variant: normal; font-weight: 700; text-decoration: underline;"> </span></a></p></div></div></div></div></div></div></div></div></div></section></div><div class="Xpil1b xgQ6eb"></div><footer jsname="yePe5c"><section id="h.776dc02a570990a6_37" class="yaqOZd cJgDec nyKByd" style=""><div class="IFuOkc" style="background-position: center center; background-image: url(https://lh4.googleusercontent.com/wviaGG1HeXd7QegMuOZlycaJbVdZJ8NwRkQHTNYUeBH231_GVhm2ssPHY6Vuym32nspJlMHZq6T8sr27iNSbQ_c=w16383); background-size: cover;"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.776dc02a570990a6_33" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><small id="h.7cmel1nrcxwa" dir="ltr" class="zfr3Q TMjjoe CDt4Ke " style="display: block; text-align: center;"><span class="C9DxTc " style="color: #ffffff; font-family: 'Times New Roman', Arial; font-size: 10.5pt; font-weight: 700; vertical-align: baseline;">All Rights Reserved ® WiMNeT 2023</span><span class="C9DxTc " style="color: #ffffff; font-family: 'Times New Roman', Arial; font-size: 11.0pt; font-weight: 700; vertical-align: baseline;"> </span></small></div></div></div></div></div></div></div></div></div></section></footer><div jscontroller="j1RDQb" jsaction="rcuQ6b:rcuQ6b;MxH79b:JdcaS;FaOgy:XuHpsb;" class="dZA9kd ynRLnc" data-last-updated-at-time="1703312973580" data-is-preview="false"><div role="button" class="U26fgb JRtysb WzwrXb I12f0b K2mXPb zXBiaf ynRLnc" jscontroller="iSvg6e" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;;keydown:I481le;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="0" aria-haspopup="true" aria-expanded="false" data-menu-corner="bottom-start" data-anchor-corner="top-start"><div class="NWlf3e MbhUzd" jsname="ksKsZd"></div><span jsslot class="MhXXcc oJeWuf"><span class="Lw7GHd snByac"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span><div jsname="xl07Ob" style="display:none" aria-hidden="true"><div class="JPdR6b hVNH5c" jscontroller="uY3Nvd" jsaction="IpSVtb:TvD9Pc;fEN2Ze:xzS4ub;frq95c:LNeFm;cFpp9e:J9oOtd; click:H8nU8b; mouseup:H8nU8b; keydown:I481le; keypress:Kr2w4b; blur:O22p3e; focus:H8nU8b" role="menu" tabindex="0" style="position:fixed"><div class="XvhY1d" jsaction="mousedown:p8EH2c; touchstart:p8EH2c;"><div class="JAPqpe K0NPx"><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Google Sites" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:Toy3n;" jsname="V2zOu"><div class="jO7h3c">Google Sites</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" data-disabled-tooltip="Report abuse is not available in preview mode" aria-label="Report abuse" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jscontroller="HYv29e" jsaction="JIbuQc:dQ6O0c;" jsname="lV5oke" data-abuse-proto="%.@.null,null,"https://sites.google.com/view/wimnet-2023/accepted-papers"]" data-abuse-reporting-widget-proto="%.@.null,"https://sites.google.com/view/wimnet-2023/accepted-papers"]"><div class="jO7h3c">Report abuse</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Page details" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:hriXLd;" jsname="Rg8K2c"><div class="jO7h3c">Page details</div></div></span></div></div></div></div></div></div><div jscontroller="j1RDQb" jsaction="focusin:gBxDVb(srlkmf); focusout:zvXhGb(srlkmf); click:ro2KTd(psdQ5e);JIbuQc:DSypkd(Bg3gkf);MxH79b:JdcaS;rcuQ6b:rcuQ6b;" class="LqzjUe ynRLnc" data-last-updated-at-time="1703312973580" data-is-preview="false"><div jsname="psdQ5e" class="Q0cSn"></div><div jsname="bN97Pc" class="hBW7Hb"><div role="button" class="U26fgb mUbCce fKz7Od kpPxtd QMuaBc M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="-1" aria-hidden="true"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span></div><div jsname="srlkmf" class="hUphyc"><div class="YkaBSd"><div class="iBkmkf"><span>Page updated</span> <span jsname="CFIm1b" class="dji00c" jsaction="AHmuwe:eGiyHb; mouseover:eGiyHb;" tabindex="0" role="contentinfo"></span></div></div><div class="YkaBSd" jsaction="click:Toy3n;"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow jsname="V2zOu" aria-disabled="false" tabindex="0">Google Sites</div></div><div class="YkaBSd" jscontroller="HYv29e" jsaction="click:dQ6O0c;" data-abuse-proto="%.@.null,null,"https://sites.google.com/view/wimnet-2023/accepted-papers"]" data-abuse-reporting-widget-proto="%.@.null,"https://sites.google.com/view/wimnet-2023/accepted-papers"]"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow aria-label="Report abuse" aria-disabled="false" tabindex="0">Report abuse</div></div></div></div></div></div></div></div><script nonce="3Kdf6j9dMwjDEvAJ1hykDw">DOCS_timing['cov']=new Date().getTime();</script><script src="https://www.gstatic.com/_/atari/_/js/k=atari.vw.en_US.fw_mAcuwUyE.O/am=MBiA/d=1/rs=AGEqA5lwNXFYaHUUDGYHiMqlOO36DqQAOw/m=view" id="base-js" nonce="3Kdf6j9dMwjDEvAJ1hykDw"></script></div></div><div jscontroller="YV8yqd" jsaction="rcuQ6b:npT2md"></div></body></html>