CINXE.COM

NC - Accepted Papers

<!DOCTYPE html><html lang="en-US" itemscope itemtype="http://schema.org/WebPage"><head><meta charset="utf-8"><script nonce="gV9DOK5VfxTFbYhYpC1lDg">var DOCS_timing={}; DOCS_timing['sl']=new Date().getTime();</script><script nonce="gV9DOK5VfxTFbYhYpC1lDg">function _DumpException(e) {throw e;}</script><script data-id="_gd" nonce="gV9DOK5VfxTFbYhYpC1lDg">window.WIZ_global_data = {"K1cgmc":"%.@.[null,null,null,[null,1,[1732501877,415858000]]]]","nQyAE":{}};</script><script nonce="gV9DOK5VfxTFbYhYpC1lDg">_docs_flag_initialData={"atari-emtpr":false,"atari-eibrm":false,"docs-text-elei":false,"docs-text-usc":true,"atari-bae":false,"docs-text-emtps":true,"docs-text-etsrdpn":false,"docs-text-etsrds":false,"docs-text-endes":false,"docs-text-escpv":true,"docs-text-ecfs":false,"docs-text-ecis":true,"docs-text-eectfs":true,"docs-text-edctzs":true,"docs-text-eetxpc":false,"docs-text-eetxp":false,"docs-text-ertkmcp":true,"docs-text-ettctvs":false,"docs-text-ettts":true,"docs-text-escoubs":false,"docs-text-escivs":false,"docs-text-escitrbs":false,"docs-text-ecgvd":false,"docs-text-esbbcts":true,"docs-text-etccdts":false,"docs-text-etcchrs":false,"docs-text-etctrs":false,"docs-text-eltbbs":true,"docs-text-ecvdis":false,"docs-text-elaiabbs":false,"docs-text-eiosmc":false,"docs-text-ecslpo":false,"docs-text-etb":false,"docs-text-esbefr":false,"docs-text-ipi":false,"docs-etshc":false,"docs-text-tbcb":2.0E7,"docs-efsmsdl":false,"docs-text-etof":false,"docs-text-ehlb":false,"docs-text-epa":true,"docs-text-dwit":false,"docs-text-elawp":false,"docs-eec":false,"docs-ecot":"","docs-text-enbcr":false,"docs-sup":"","umss":false,"docs-eldi":false,"docs-dli":false,"docs-liap":"/logImpressions","ilcm":{"eui":"AHKXmL355q2ZLIzCgnExD2bXJYuoUelzSZvipC_bfcyRloNQ6oB2CNKt8RMSZV9fr48ehM5duK2-","je":1,"sstu":1732679982483782,"si":"CMeS9vbP-4kDFQMDbwYdQXgkew","gsc":null,"ei":[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747267,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50561343,50561351,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71652830,71652838,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94327671,94327679,94333153,94333161,94353368,94353376,94390153,94390161,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444292,94444300,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086181,95086189,95087186,95087194,95112873,95112881,95118561,95118569,95135933,95135941,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95270945,95270953,95314802,95314810,95317985,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101606928,101606936,101617516,101617524,101631040,101631048,101705089,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101875074,101875082,102047752,102047760],"crc":0,"cvi":[]},"docs-ccdil":false,"docs-eil":true,"info_params":{},"buildLabel":"editors.sites-viewer-frontend_20241112.02_p1","docs-show_debug_info":false,"atari-jefp":"/_/view/jserror","docs-jern":"view","atari-rhpp":"/_/view","docs-ecuach":false,"docs-cclt":2033,"docs-ecci":true,"docs-esi":false,"docs-efypr":true,"docs-eyprp":true}; _docs_flag_cek= null ; if (window['DOCS_timing']) {DOCS_timing['ifdld']=new Date().getTime();}</script><meta name="viewport" content="width=device-width, initial-scale=1"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="referrer" content="origin"><link rel="icon" href="https://lh6.googleusercontent.com/o20TuyKRNHQcJsVHSvTuYtLfbgeM48kxvqq3zXCq4EVsNCAoegJZW5wpg0FNv-jav-NQIDYSJArotjR666iWd3Voy8xp8jaAjLhQjhBa8V43SIFG"><meta property="og:title" content="NC - Accepted Papers"><meta property="og:type" content="website"><meta property="og:url" content="https://sites.google.com/view/nc-2023/accepted-papers"><meta property="og:description" content="Accepted Papers "><meta itemprop="name" content="NC - Accepted Papers"><meta itemprop="description" content="Accepted Papers "><meta itemprop="url" content="https://sites.google.com/view/nc-2023/accepted-papers"><meta itemprop="thumbnailUrl" content="https://lh6.googleusercontent.com/o20TuyKRNHQcJsVHSvTuYtLfbgeM48kxvqq3zXCq4EVsNCAoegJZW5wpg0FNv-jav-NQIDYSJArotjR666iWd3Voy8xp8jaAjLhQjhBa8V43SIFG"><meta itemprop="image" content="https://lh6.googleusercontent.com/o20TuyKRNHQcJsVHSvTuYtLfbgeM48kxvqq3zXCq4EVsNCAoegJZW5wpg0FNv-jav-NQIDYSJArotjR666iWd3Voy8xp8jaAjLhQjhBa8V43SIFG"><meta itemprop="imageUrl" content="https://lh6.googleusercontent.com/o20TuyKRNHQcJsVHSvTuYtLfbgeM48kxvqq3zXCq4EVsNCAoegJZW5wpg0FNv-jav-NQIDYSJArotjR666iWd3Voy8xp8jaAjLhQjhBa8V43SIFG"><meta property="og:image" content="https://lh6.googleusercontent.com/o20TuyKRNHQcJsVHSvTuYtLfbgeM48kxvqq3zXCq4EVsNCAoegJZW5wpg0FNv-jav-NQIDYSJArotjR666iWd3Voy8xp8jaAjLhQjhBa8V43SIFG"><link href="https://fonts.googleapis.com/css?family=Lato%3A300%2C300italic%2C400%2C400italic%2C700%2C700italic&display=swap" rel="stylesheet" nonce="z8EEmcwfKnkLRPCWT08qKA"><link href="https://fonts.googleapis.com/css?family=Google+Sans:400,500|Roboto:300,400,500,700|Source+Code+Pro:400,700&display=swap" rel="stylesheet" nonce="z8EEmcwfKnkLRPCWT08qKA"><style nonce="z8EEmcwfKnkLRPCWT08qKA">@media only screen and (max-width: 479px){.jgG6ef{font-size: 17.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.jgG6ef{font-size: 17.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.jgG6ef{font-size: 18.0pt;}}@media only screen and (min-width: 1280px){.jgG6ef{font-size: 18.0pt;}}</style><link rel="stylesheet" href="https://www.gstatic.com/_/atari/_/ss/k=atari.vw.7R57rYYVGiA.L.X.O/am=MBiA/d=1/rs=AGEqA5nH97dOwqY0iGblvGlWiaR59owncA" data-id="_cl" nonce="z8EEmcwfKnkLRPCWT08qKA"><script nonce="gV9DOK5VfxTFbYhYpC1lDg"></script><title>NC - Accepted Papers</title><style jsname="ptDGoc" nonce="z8EEmcwfKnkLRPCWT08qKA">.M63kCb{background-color: rgba(255,255,255,1);}.OUGEr{color: rgba(33,33,33,1);}.duRjpb .OUGEr{color: rgba(34,110,147,1);}.JYVBee .OUGEr{color: rgba(34,110,147,1);}.OmQG5e .OUGEr{color: rgba(33,33,33,1);}.iwQgFb{background-color: rgba(0,0,0,0.150000006);}.ySLm4c{font-family: Lato, sans-serif;}.CbiMKe{background-color: rgba(30,108,147,1);}.qeLZfd .zfr3Q{color: rgba(33,33,33,1);}.qeLZfd .qnVSj{color: rgba(33,33,33,1);}.qeLZfd .Glwbz{color: rgba(33,33,33,1);}.qeLZfd .duRjpb{color: rgba(34,110,147,1);}.qeLZfd .qLrapd{color: rgba(34,110,147,1);}.qeLZfd .JYVBee{color: rgba(34,110,147,1);}.qeLZfd .aHM7ed{color: rgba(34,110,147,1);}.qeLZfd .OmQG5e{color: rgba(33,33,33,1);}.qeLZfd .NHD4Gf{color: rgba(33,33,33,1);}.qeLZfd .aw5Odc{color: rgba(0,101,128,1);}.qeLZfd .dhtgD:hover{color: rgba(0,0,0,1);}.qeLZfd .dhtgD:visited{color: rgba(0,101,128,1);}.qeLZfd .iwQgFb{background-color: rgba(0,0,0,0.150000006);}.qeLZfd .OUGEr{color: rgba(33,33,33,1);}.qeLZfd .duRjpb .OUGEr{color: rgba(34,110,147,1);}.qeLZfd .JYVBee .OUGEr{color: rgba(34,110,147,1);}.qeLZfd .OmQG5e .OUGEr{color: rgba(33,33,33,1);}.qeLZfd:before{background-color: rgba(242,242,242,1); display: block;}.lQAHbd .zfr3Q{color: rgba(255,255,255,1);}.lQAHbd .qnVSj{color: rgba(255,255,255,1);}.lQAHbd .Glwbz{color: rgba(255,255,255,1);}.lQAHbd .duRjpb{color: rgba(255,255,255,1);}.lQAHbd .qLrapd{color: rgba(255,255,255,1);}.lQAHbd .JYVBee{color: rgba(255,255,255,1);}.lQAHbd .aHM7ed{color: rgba(255,255,255,1);}.lQAHbd .OmQG5e{color: rgba(255,255,255,1);}.lQAHbd .NHD4Gf{color: rgba(255,255,255,1);}.lQAHbd .aw5Odc{color: rgba(255,255,255,1);}.lQAHbd .dhtgD:hover{color: rgba(255,255,255,1);}.lQAHbd .dhtgD:visited{color: rgba(255,255,255,1);}.lQAHbd .iwQgFb{background-color: rgba(255,255,255,0.150000006);}.lQAHbd .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .duRjpb .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .JYVBee .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .OmQG5e .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .CbiMKe{background-color: rgba(255,255,255,1);}.lQAHbd:before{background-color: rgba(30,108,147,1); display: block;}.cJgDec .zfr3Q{color: rgba(255,255,255,1);}.cJgDec .zfr3Q .OUGEr{color: rgba(255,255,255,1);}.cJgDec .qnVSj{color: rgba(255,255,255,1);}.cJgDec .Glwbz{color: rgba(255,255,255,1);}.cJgDec .qLrapd{color: rgba(255,255,255,1);}.cJgDec .aHM7ed{color: rgba(255,255,255,1);}.cJgDec .NHD4Gf{color: rgba(255,255,255,1);}.cJgDec .IFuOkc:before{background-color: rgba(33,33,33,1); opacity: 0; display: block;}.O13XJf{height: 340px; padding-bottom: 60px; padding-top: 60px;}.O13XJf .IFuOkc{background-color: rgba(34,110,147,1); background-image: url(https://ssl.gstatic.com/atari/images/simple-header-blended-small.png);}.O13XJf .IFuOkc:before{background-color: rgba(33,33,33,1); opacity: 0.4; display: block;}.O13XJf .zfr3Q{color: rgba(255,255,255,1);}.O13XJf .qnVSj{color: rgba(255,255,255,1);}.O13XJf .Glwbz{color: rgba(255,255,255,1);}.O13XJf .duRjpb{color: rgba(255,255,255,1);}.O13XJf .qLrapd{color: rgba(255,255,255,1);}.O13XJf .JYVBee{color: rgba(255,255,255,1);}.O13XJf .aHM7ed{color: rgba(255,255,255,1);}.O13XJf .OmQG5e{color: rgba(255,255,255,1);}.O13XJf .NHD4Gf{color: rgba(255,255,255,1);}.tpmmCb .zfr3Q{color: rgba(33,33,33,1);}.tpmmCb .zfr3Q .OUGEr{color: rgba(33,33,33,1);}.tpmmCb .qnVSj{color: rgba(33,33,33,1);}.tpmmCb .Glwbz{color: rgba(33,33,33,1);}.tpmmCb .qLrapd{color: rgba(33,33,33,1);}.tpmmCb .aHM7ed{color: rgba(33,33,33,1);}.tpmmCb .NHD4Gf{color: rgba(33,33,33,1);}.tpmmCb .IFuOkc:before{background-color: rgba(255,255,255,1); display: block;}.tpmmCb .Wew9ke{fill: rgba(33,33,33,1);}.aw5Odc{color: rgba(0,101,128,1);}.dhtgD:hover{color: rgba(0,122,147,1);}.dhtgD:active{color: rgba(0,122,147,1);}.dhtgD:visited{color: rgba(0,101,128,1);}.Zjiec{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 19pt; font-weight: 300; letter-spacing: 1px; line-height: 1.3; padding-bottom: 62.5px; padding-left: 48px; padding-right: 36px; padding-top: 11.5px;}.XMyrgf{margin-top: 0px; margin-left: 48px; margin-bottom: 24px; margin-right: 24px;}.TlfmSc{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 15pt; font-weight: 300; line-height: 1.333;}.Mz8gvb{color: rgba(255,255,255,1);}.zDUgLc{background-color: rgba(33,33,33,1);}.QTKDff.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.YTv4We{color: rgba(178,178,178,1);}.YTv4We:hover:before{background-color: rgba(255,255,255,0.1199999973); display: block;}.YTv4We.chg4Jd:focus:before{border-color: rgba(255,255,255,0.3600000143); display: block;}.eWDljc{background-color: rgba(33,33,33,1);}.eWDljc .hDrhEe{padding-left: 8px;}.ZXW7w{color: rgba(255,255,255,1); opacity: 0.26;}.PsKE7e{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 12pt; font-weight: 300;}.lhZOrc{color: rgba(73,170,212,1);}.hDrhEe:hover{color: rgba(73,170,212,1);}.M9vuGd{color: rgba(73,170,212,1); font-weight: 400;}.jgXgSe:hover{color: rgba(73,170,212,1);}.j10yRb:hover{color: rgba(0,188,212,1);}.j10yRb.chg4Jd:focus:before{border-color: rgba(255,255,255,0.3600000143); display: block;}.tCHXDc{color: rgba(255,255,255,1);}.iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.wgxiMe{background-color: rgba(33,33,33,1);}.fOU46b .TlfmSc{color: rgba(255,255,255,1);}.fOU46b .KJll8d{background-color: rgba(255,255,255,1);}.fOU46b .Mz8gvb{color: rgba(255,255,255,1);}.fOU46b .Mz8gvb.chg4Jd:focus:before{border-color: rgba(255,255,255,1); display: block;}.fOU46b .qV4dIc{color: rgba(255,255,255,0.8700000048);}.fOU46b .jgXgSe:hover{color: rgba(255,255,255,1);}.fOU46b .M9vuGd{color: rgba(255,255,255,1);}.fOU46b .tCHXDc{color: rgba(255,255,255,0.8700000048);}.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.fOU46b .G8QRnc .Mz8gvb{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .Mz8gvb.chg4Jd:focus:before{border-color: rgba(0,0,0,0.8000000119); display: block;}.fOU46b .G8QRnc .ZXW7w{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .TlfmSc{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .KJll8d{background-color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .qV4dIc{color: rgba(0,0,0,0.6399999857);}.fOU46b .G8QRnc .jgXgSe:hover{color: rgba(0,0,0,0.8199999928);}.fOU46b .G8QRnc .M9vuGd{color: rgba(0,0,0,0.8199999928);}.fOU46b .G8QRnc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .G8QRnc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .usN8rf .Mz8gvb{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .Mz8gvb.chg4Jd:focus:before{border-color: rgba(0,0,0,0.8000000119); display: block;}.fOU46b .usN8rf .ZXW7w{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .TlfmSc{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .KJll8d{background-color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .qV4dIc{color: rgba(0,0,0,0.6399999857);}.fOU46b .usN8rf .jgXgSe:hover{color: rgba(0,0,0,0.8199999928);}.fOU46b .usN8rf .M9vuGd{color: rgba(0,0,0,0.8199999928);}.fOU46b .usN8rf .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .usN8rf .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .aCIEDd .qV4dIc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .TlfmSc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .KJll8d{background-color: rgba(33,33,33,1);}.fOU46b .aCIEDd .ZXW7w{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .jgXgSe:hover{color: rgba(33,33,33,1); opacity: 0.82;}.fOU46b .aCIEDd .Mz8gvb{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .tCHXDc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}.fOU46b .a3ETed .qV4dIc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .TlfmSc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .KJll8d{background-color: rgba(255,255,255,1);}.fOU46b .a3ETed .ZXW7w{color: rgba(255,255,255,1);}.fOU46b .a3ETed .jgXgSe:hover{color: rgba(255,255,255,1); opacity: 0.82;}.fOU46b .a3ETed .Mz8gvb{color: rgba(255,255,255,1);}.fOU46b .a3ETed .tCHXDc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.XeSM4.b2Iqye.fOU46b .LBrwzc .tCHXDc{color: rgba(255,255,255,0.8700000048);}}.XeSM4.b2Iqye.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.KuNac.b2Iqye.fOU46b .tCHXDc{color: rgba(0,0,0,0.6399999857);}}.KuNac.b2Iqye.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .zDUgLc{opacity: 0;}.LBrwzc .ZXW7w{color: rgba(0,0,0,1);}.LBrwzc .KJll8d{background-color: rgba(0,0,0,1);}.GBy4H .ZXW7w{color: rgba(255,255,255,1);}.GBy4H .KJll8d{background-color: rgba(255,255,255,1);}.eBSUbc{background-color: rgba(33,33,33,1); color: rgba(0,188,212,0.6999999881);}.BFDQOb:hover{color: rgba(73,170,212,1);}.ImnMyf{background-color: rgba(255,255,255,1); color: rgba(33,33,33,1);}.Vs12Bd{background-color: rgba(242,242,242,1); color: rgba(33,33,33,1);}.S5d9Rd{background-color: rgba(30,108,147,1); color: rgba(255,255,255,1);}.zfr3Q{color: rgba(33,33,33,1); font-family: Lato, sans-serif; font-size: 11pt; font-weight: 400; line-height: 1.6667; margin-top: 12px;}.qnVSj{color: rgba(33,33,33,1);}.Glwbz{color: rgba(33,33,33,1);}.duRjpb{color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 34pt; font-weight: 300; letter-spacing: 0.5px; line-height: 1.2; margin-top: 30px;}.Ap4VC{margin-bottom: -30px;}.qLrapd{color: rgba(34,110,147,1);}.JYVBee{color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 19pt; font-weight: 400; line-height: 1.4; margin-top: 20px;}.CobnVe{margin-bottom: -20px;}.aHM7ed{color: rgba(34,110,147,1);}.OmQG5e{color: rgba(33,33,33,1); font-family: Lato, sans-serif; font-size: 15pt; font-style: normal; font-weight: 400; line-height: 1.25; margin-top: 16px;}.GV3q8e{margin-bottom: -16px;}.NHD4Gf{color: rgba(33,33,33,1);}.LB7kq .duRjpb{font-size: 64pt; letter-spacing: 2px; line-height: 1; margin-top: 40px;}.LB7kq .JYVBee{font-size: 25pt; font-weight: 300; line-height: 1.1; margin-top: 25px;}@media only screen and (max-width: 479px){.LB7kq .duRjpb{font-size: 40pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.LB7kq .duRjpb{font-size: 53pt;}}@media only screen and (max-width: 479px){.LB7kq .JYVBee{font-size: 19pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.LB7kq .JYVBee{font-size: 22pt;}}.O13XJf{height: 340px; padding-bottom: 60px; padding-top: 60px;}@media only screen and (min-width: 480px) and (max-width: 767px){.O13XJf{height: 280px; padding-bottom: 40px; padding-top: 40px;}}@media only screen and (max-width: 479px){.O13XJf{height: 250px; padding-bottom: 30px; padding-top: 30px;}}.SBrW1{height: 520px;}@media only screen and (min-width: 480px) and (max-width: 767px){.SBrW1{height: 520px;}}@media only screen and (max-width: 479px){.SBrW1{height: 400px;}}.Wew9ke{fill: rgba(255,255,255,1);}.gk8rDe{height: 180px; padding-bottom: 32px; padding-top: 60px;}.gk8rDe .zfr3Q{color: rgba(0,0,0,1);}.gk8rDe .duRjpb{color: rgba(34,110,147,1); font-size: 45pt; line-height: 1.1;}.gk8rDe .qLrapd{color: rgba(34,110,147,1);}.gk8rDe .JYVBee{color: rgba(34,110,147,1); font-size: 27pt; line-height: 1.35; margin-top: 15px;}.gk8rDe .aHM7ed{color: rgba(34,110,147,1);}.gk8rDe .OmQG5e{color: rgba(33,33,33,1);}.gk8rDe .NHD4Gf{color: rgba(33,33,33,1);}@media only screen and (max-width: 479px){.gk8rDe .duRjpb{font-size: 30pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .duRjpb{font-size: 38pt;}}@media only screen and (max-width: 479px){.gk8rDe .JYVBee{font-size: 20pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .JYVBee{font-size: 24pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe{padding-top: 45px;}}@media only screen and (max-width: 479px){.gk8rDe{padding-bottom: 0px; padding-top: 30px;}}.dhtgD{text-decoration: underline;}.JzO0Vc{background-color: rgba(33,33,33,1); font-family: Lato, sans-serif; width: 250px;}@media only screen and (min-width: 1280px){.JzO0Vc{padding-top: 48.5px;}}.TlfmSc{font-family: Lato, sans-serif; font-size: 15pt; font-weight: 300; line-height: 1.333;}.PsKE7e{font-family: Lato, sans-serif; font-size: 12pt;}.IKA38e{line-height: 1.21;}.hDrhEe{padding-bottom: 11.5px; padding-top: 11.5px;}.zDUgLc{opacity: 1;}.QmpIrf{background-color: rgba(30,108,147,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal; line-height: normal;}.KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.lQAHbd .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.lQAHbd .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.lQAHbd .Mt0nFe{border-color: rgba(255,255,255,0.200000003);}.cJgDec .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.cJgDec .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.tpmmCb .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.tpmmCb .KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.gk8rDe .QmpIrf{background-color: rgba(30,108,147,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.gk8rDe .KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.O13XJf .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.O13XJf .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.Y4CpGd{font-family: Lato, sans-serif; font-size: 11pt;}.CMArNe{background-color: rgba(242,242,242,1);}.LBrwzc .TlfmSc{color: rgba(0,0,0,0.8000000119);}.LBrwzc .YTv4We{color: rgba(0,0,0,0.6399999857);}.LBrwzc .YTv4We.chg4Jd:focus:before{border-color: rgba(0,0,0,0.6399999857); display: block;}.LBrwzc .Mz8gvb{color: rgba(0,0,0,0.6399999857);}.LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.LBrwzc .wgxiMe{background-color: rgba(255,255,255,1);}.LBrwzc .qV4dIc{color: rgba(0,0,0,0.6399999857);}.LBrwzc .M9vuGd{color: rgba(0,0,0,0.8000000119); font-weight: bold;}.LBrwzc .Zjiec{color: rgba(0,0,0,0.8000000119);}.LBrwzc .IKA38e{color: rgba(0,0,0,0.6399999857);}.LBrwzc .lhZOrc.IKA38e{color: rgba(0,0,0,0.8000000119); font-weight: bold;}.LBrwzc .j10yRb:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .eBSUbc{color: rgba(0,0,0,0.8000000119);}.LBrwzc .hDrhEe:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .jgXgSe:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .M9vuGd:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .zDUgLc{border-bottom-color: rgba(204,204,204,1); border-bottom-width: 1px; border-bottom-style: solid;}.fOU46b .LBrwzc .M9vuGd{color: rgba(0,0,0,0.8000000119);}.fOU46b .LBrwzc .jgXgSe:hover{color: rgba(0,0,0,0.8000000119);}.fOU46b .LBrwzc .zDUgLc{opacity: 1; border-bottom-style: none;}.fOU46b .LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .GBy4H .M9vuGd{color: rgba(255,255,255,1);}.fOU46b .GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.fOU46b .GBy4H .zDUgLc{opacity: 1;}.fOU46b .GBy4H .tCHXDc{color: rgba(255,255,255,0.8700000048);}.fOU46b .GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.XeSM4.G9Qloe.fOU46b .LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.XeSM4.G9Qloe.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.GBy4H .lhZOrc.IKA38e{color: rgba(255,255,255,1);}.GBy4H .eBSUbc{color: rgba(255,255,255,0.8700000048);}.GBy4H .hDrhEe:hover{color: rgba(255,255,255,1);}.GBy4H .j10yRb:hover{color: rgba(255,255,255,1);}.GBy4H .YTv4We{color: rgba(255,255,255,1);}.GBy4H .YTv4We.chg4Jd:focus:before{border-color: rgba(255,255,255,1); display: block;}.GBy4H .tCHXDc{color: rgba(255,255,255,0.8700000048);}.GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.GBy4H .M9vuGd{color: rgba(255,255,255,1);}.GBy4H .M9vuGd:hover{color: rgba(255,255,255,1);}.QcmuFb{padding-left: 20px;}.vDPrib{padding-left: 40px;}.TBDXjd{padding-left: 60px;}.bYeK8e{padding-left: 80px;}.CuqSDe{padding-left: 100px;}.Havqpe{padding-left: 120px;}.JvDrRe{padding-left: 140px;}.o5lrIf{padding-left: 160px;}.yOJW7c{padding-left: 180px;}.rB8cye{padding-left: 200px;}.RuayVd{padding-right: 20px;}.YzcKX{padding-right: 40px;}.reTV0b{padding-right: 60px;}.vSYeUc{padding-right: 80px;}.PxtZIe{padding-right: 100px;}.ahQMed{padding-right: 120px;}.rzhcXb{padding-right: 140px;}.PBhj0b{padding-right: 160px;}.TlN46c{padding-right: 180px;}.GEdNnc{padding-right: 200px;}.TMjjoe{font-family: Lato, sans-serif; font-size: 9pt; line-height: 1.2; margin-top: 0px;}@media only screen and (min-width: 1280px){.yxgWrb{margin-left: 250px;}}@media only screen and (max-width: 479px){.Zjiec{font-size: 15pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.Zjiec{font-size: 17pt;}}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12pt;}}@media only screen and (max-width: 479px){.duRjpb{font-size: 24pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.duRjpb{font-size: 29pt;}}@media only screen and (max-width: 479px){.JYVBee{font-size: 15pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.JYVBee{font-size: 17pt;}}@media only screen and (max-width: 479px){.OmQG5e{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.OmQG5e{font-size: 14pt;}}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12pt;}}@media only screen and (max-width: 479px){.TMjjoe{font-size: 9pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TMjjoe{font-size: 9pt;}}section[id="h.32a03f15c00ef3ad_16"] .IFuOkc:before{opacity: 0.4;}</style><script nonce="gV9DOK5VfxTFbYhYpC1lDg">_at_config = [null,"AIzaSyChg3MFqzdi1P5J-YvEyakkSA1yU7HRcDI","897606708560-a63d8ia0t9dhtpdt4i3djab2m42see7o.apps.googleusercontent.com",null,null,null,null,null,null,null,null,null,null,null,"SITES_%s",null,null,null,null,null,null,null,null,null,["AHKXmL355q2ZLIzCgnExD2bXJYuoUelzSZvipC_bfcyRloNQ6oB2CNKt8RMSZV9fr48ehM5duK2-",1,"CMeS9vbP-4kDFQMDbwYdQXgkew",1732679982483782,[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747267,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50561343,50561351,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71652830,71652838,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94327671,94327679,94333153,94333161,94353368,94353376,94390153,94390161,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444292,94444300,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086181,95086189,95087186,95087194,95112873,95112881,95118561,95118569,95135933,95135941,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95270945,95270953,95314802,95314810,95317985,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101606928,101606936,101617516,101617524,101631040,101631048,101705089,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101875074,101875082,102047752,102047760]],null,null,null,null,0,null,null,null,null,null,null,null,null,null,"https://drive.google.com",null,null,null,null,null,null,null,null,null,0,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"v2internal","https://docs.google.com",null,null,null,null,null,null,"https://sites.google.com/new/",null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,"",null,null,null,null,null,null,null,null,null,null,null,null,6,null,null,"https://accounts.google.com/o/oauth2/auth","https://accounts.google.com/o/oauth2/postmessageRelay",null,null,null,null,78,"https://sites.google.com/new/?usp\u003dviewer_footer",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://www.gstatic.com/atari/embeds/83a60601c213b72fb19c1855fb0c5f26/intermediate-frame-minified.html",0,null,"v2beta",null,null,null,null,null,null,4,"https://accounts.google.com/o/oauth2/iframe",null,null,null,null,null,null,"https://127966048-atari-embeds.googleusercontent.com/embeds/16cb204cf3a9d4d223a0a3fd8b0eec5d/inner-frame-minified.html",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://sites.google.com/view/nc-2023/accepted-papers",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,0,null,"",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,[1732679982484,"editors.sites-viewer-frontend_20241112.02_p1","695977640",null,1,1,""],null,null,null,null,0,null,null,0,null,null,null,null,null,null,null,null,20,500,"https://domains.google.com",null,0,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,1,0,1,0,0,0,0,null,null,null,null,null,"https://www.google.com/calendar/embed",null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,"PROD",0,null,0,null,1]; window.globals = {"enableAnalytics":true,"webPropertyId":"","showDebug":false,"hashedSiteId":"c622b44b3a6dad2901c6315b9007fec8cfe5f39ed4e7c87129bffb342c40b63c","normalizedPath":"view/nc-2023/accepted-papers","pageTitle":"Accepted Papers"}; function gapiLoaded() {if (globals.gapiLoaded == undefined) {globals.gapiLoaded = true;} else {globals.gapiLoaded();}}window.messages = []; window.addEventListener && window.addEventListener('message', function(e) {if (window.messages && e.data && e.data.magic == 'SHIC') {window.messages.push(e);}});</script><script src="https://apis.google.com/js/client.js?onload=gapiLoaded" nonce="gV9DOK5VfxTFbYhYpC1lDg"></script><script nonce="gV9DOK5VfxTFbYhYpC1lDg">(function(){}).call(this); </script><script nonce="gV9DOK5VfxTFbYhYpC1lDg">const imageUrl = 'https:\/\/lh3.googleusercontent.com\/wpMfcrZBs9fVUuvhvozpmt1s1bHn_OSaEc30UecKCPWjY7WQ03JO135K7-P7joznYSxAwPTacNXDnw0v5xOHPDI\x3dw16383'; function bgImgLoaded() { if (!globals.headerBgImgLoaded) { globals.headerBgImgLoaded = new Date().getTime(); } else { globals.headerBgImgLoaded(); } } if (imageUrl) { const img = new Image(); img.src = imageUrl; img.onload = bgImgLoaded; globals.headerBgImgExists = true; } else { globals.headerBgImgExists = false; } </script></head><body dir="ltr" itemscope itemtype="http://schema.org/WebPage" id="yDmH0d" css="yDmH0d"><div jscontroller="pc62j" jsmodel="iTeaXe" jsaction="rcuQ6b:WYd;GvneHb:og1FDd;vbaUQc:uAM5ec;"><div id="docs-banner-container"><div id="docs-banners"><div id="HB1eCd-mzNpsf-r8s4j-ORHb"></div><div id="HB1eCd-TZk80d-r8s4j-ORHb" aria-live="assertive" aria-atomic="true"></div></div><div class="HB1eCd-Vkfede-NBtyUd-PvRhvb-LwH6nd"></div></div><div jscontroller="X4BaPc" jsaction="rcuQ6b:WYd;o6xM5b:Pg9eo;HuL2Hd:mHeCvf;VMhF5:FFYy5e;sk3Qmb:HI1Mdd;JIbuQc:rSzFEd(z2EeY),aSaF6e(ilzYPe);"><div jscontroller="o1L5Wb" data-sitename="nc-2023" data-search-scope="1" data-universe="1" jsmodel="fNFZH" jsaction="Pe9H6d:cZFEp;WMZaJ:VsGN3;hJluRd:UADL7b;zuqEgd:HI9w0;tr6QDd:Y8aXB;MxH79b:xDkBfb;JIbuQc:SPXMTb(uxAMZ),LjG1Ed(a6mxbb);" jsname="G0jgYd"><div jsname="gYwusb" class="p9b27"></div><div jscontroller="RrXLpc" jsname="XeeWQc" role="banner" jsaction="keydown:uiKYid(OH0EC);rcuQ6b:WYd;zuqEgd:ufqpf;JIbuQc:XfTnxb(lfEfFf),AlTiYc(GeGHKb),AlTiYc(m1xNUe),zZlNMe(pZn8Oc);YqO5N:ELcyfe;"><div jsname="bF1uUb" class="BuY5Fd" jsaction="click:xVuwSc;"></div><div jsname="MVsrn" class="TbNlJb "><div role="button" class="U26fgb mUbCce fKz7Od h3nfre M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="GeGHKb" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div><div class="E2UJ5" jsname="M6JdT"><div class="rFrNMe b7AJhc zKHdkd" jscontroller="pxq3x" jsaction="clickonly:KjsqPd; focus:Jt1EX; blur:fpfTEe; input:Lg5SV" jsshadow jsname="OH0EC" aria-expanded="true"><div class="aCsJod oJeWuf"><div class="aXBtI I0VJ4d Wic03c"><span jsslot class="A37UZe qgcB3c iHd5yb"><div role="button" class="U26fgb mUbCce fKz7Od i3PoXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="lfEfFf" aria-label="Search" aria-disabled="false" tabindex="0" data-tooltip="Search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div><div class="EmVfjc SKShhf" data-loadingmessage="Loading…" jscontroller="qAKInc" jsaction="animationend:kWijWc;dyRcpb:dyRcpb" jsname="aZ2wEe"><div class="Cg7hO" aria-live="assertive" jsname="vyyg5"></div><div jsname="Hxlbvc" class="xu46lf"><div class="ir3uv uWlRce co39ub"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv GFoASc Cn087"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv WpeOqd hfsr6b"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv rHV3jf EjXFBf"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div></div></div><div role="button" class="U26fgb mUbCce fKz7Od JyJRXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="m1xNUe" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div></span><div class="Xb9hP"><input type="search" class="whsOnd zHQkBf" jsname="YPqjbf" autocomplete="off" tabindex="0" aria-label="Search this site" value="" aria-disabled="false" autofocus role="combobox" data-initial-value=""/><div jsname="LwH6nd" class="ndJi5d snByac" aria-hidden="true">Search this site</div></div><span jsslot class="A37UZe sxyYjd MQL3Ob"><div role="button" class="U26fgb mUbCce fKz7Od Kk06A M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="pZn8Oc" aria-label="Clear search" aria-disabled="false" tabindex="0" data-tooltip="Clear search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="fAUEUd" viewBox="0 0 24 24" focusable="false"><path d="M19 6.41L17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12z"></path><path d="M0 0h24v24H0z" fill="none"></path></svg></span></span></div></span><div class="i9lrp mIZh1c"></div><div jsname="XmnwAc" class="OabDMe cXrdqd"></div></div></div><div class="LXRPh"><div jsname="ty6ygf" class="ovnfwe Is7Fhb"></div></div></div></div></div></div></div><div jsname="tiN4bf"><style nonce="z8EEmcwfKnkLRPCWT08qKA">.rrJNTc{opacity: 0;}.bKy5e{pointer-events: none; position: absolute; top: 0;}</style><div class="bKy5e"><div class="rrJNTc" tabindex="-1"><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jsname="z2EeY" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to main content</span></button></div><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf br90J" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf br90J" jsname="ilzYPe" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to navigation</span></button></div></div></div><div class="M63kCb N63NQ"></div><div class="QZ3zWd"><div class="fktJzd AKpWA fOU46b yMcSQd Ly6Unf G9Qloe XeSM4 XxIgdb" jsname="UzWXSb" data-uses-custom-theme="false" data-legacy-theme-name="QualityBasics" data-legacy-theme-font-kit="Light" data-legacy-theme-color-kit="Blue" jscontroller="Md9ENb" jsaction="gsiSmd:Ffcznf;yj5fUd:cpPetb;HNXL3:q0Vyke;e2SXKd:IPDu5e;BdXpgd:nhk7K;rcuQ6b:WYd;"><header id="atIdViewHeader"><div class="BbxBP HP6J1d K5Zlne" jsname="WA9qLc" jscontroller="RQOkef" jsaction="rcuQ6b:JdcaS;MxH79b:JdcaS;VbOlFf:ywL4Jf;FaOgy:ywL4Jf; keydown:Hq2uPe; wheel:Ut4Ahc;" data-top-navigation="true" data-is-preview="false"><div class="DXsoRd YTv4We oNsfjf" role="button" tabindex="0" jsaction="click:LUvzV" jsname="z4Tpl" id="s9iPrd" aria-haspopup="true" aria-controls="yuynLe" aria-expanded="false"><svg class="wFCWne" viewBox="0 0 24 24" stroke="currentColor" jsname="B1n9ub" focusable="false"><g transform="translate(12,12)"><path class="hlJH0" d="M-9 -5 L9 -5" fill="none" stroke-width="2"/><path class="HBu6N" d="M-9 0 L9 0" fill="none" stroke-width="2"/><path class="cLAGQe" d="M-9 5 L9 5" fill="none" stroke-width="2"/></g></svg></div><nav class="JzO0Vc" jsname="ihoMLd" role="navigation" tabindex="-1" id="yuynLe" jsaction="transitionend:UD2r5"><a class="Zjiec oNsfjf" href="/view/nc-2023/home"><span>NC</span></a><ul class="jYxBte Fpy8Db" tabindex="-1"><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/home" data-url="/view/nc-2023/home" data-type="1" data-level="1">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/paper-submission" data-url="/view/nc-2023/paper-submission" data-type="1" data-level="1">Paper submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/program-committee" data-url="/view/nc-2023/program-committee" data-type="1" data-level="1">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/nc-2023/accepted-papers" data-url="/view/nc-2023/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/contact-us" data-url="/view/nc-2023/contact-us" data-type="1" data-level="1">Contact us</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/venue" data-url="/view/nc-2023/venue" data-type="1" data-level="1">Venue</a></div></div></li></ul></nav><div class="VLoccc K5Zlne QDWEj U8eYrb" jsname="rtFGi"><div class="Pvc6xe"><div jsname="I8J07e" class="TlfmSc YSH9J"><a class="GAuSPc" jsname="jIujaf" href="/view/nc-2023/home"><span class="QTKDff">NC</span></a></div><nav class="plFg0c" jscontroller="HXO1uc" jsaction="rcuQ6b:rcuQ6b;MxH79b:CfS0pe;" id="WDxLfe" data-is-preview="false" style="visibility: hidden;" role="navigation" tabindex="-1"><ul jsname="waIgnc" class="K1Ci7d oXBWEc jYxBte"><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/home" data-url="/view/nc-2023/home" data-type="1" data-level="1">Home</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/paper-submission" data-url="/view/nc-2023/paper-submission" data-type="1" data-level="1">Paper submission</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/program-committee" data-url="/view/nc-2023/program-committee" data-type="1" data-level="1">Program Committee</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J M9vuGd" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/nc-2023/accepted-papers" data-url="/view/nc-2023/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/contact-us" data-url="/view/nc-2023/contact-us" data-type="1" data-level="1">Contact us</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/venue" data-url="/view/nc-2023/venue" data-type="1" data-level="1">Venue</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf ZmrVpf oXBWEc" more-menu-item jsaction="mouseenter:Vx8Jlb; mouseleave:ysDRUd"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-expanded="false" aria-haspopup="true" data-level="1">More</a><div class="mBHtvb u5fiyc" role="presentation" title="Expand/Collapse" jsaction="click:oESVTe" jsname="ix0Hvc"><svg class="dvmRw" viewBox="0 0 24 24" stroke="currentColor" jsname="HIH2V" focusable="false"><g transform="translate(9.7,12) rotate(45)"><path class="K4B8Y" d="M-4.2 0 L4.2 0" stroke-width="2"/></g><g transform="translate(14.3,12) rotate(-45)"><path class="MrYMx" d="M-4.2 0 L4.2 0" stroke-width="2"/></g></svg></div></div></div><div class="oGuwee eWDljc RPRy1e Mkt3Tc" style="display:none;" jsname="QXE97" jsaction="transitionend:SJBdh" role="group"><ul class="VcS63b"><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/home" data-url="/view/nc-2023/home" data-type="1" data-in-more-submenu="true" data-level="2">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/paper-submission" data-url="/view/nc-2023/paper-submission" data-type="1" data-in-more-submenu="true" data-level="2">Paper submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/program-committee" data-url="/view/nc-2023/program-committee" data-type="1" data-in-more-submenu="true" data-level="2">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/nc-2023/accepted-papers" data-url="/view/nc-2023/accepted-papers" data-type="1" data-in-more-submenu="true" data-level="2">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/contact-us" data-url="/view/nc-2023/contact-us" data-type="1" data-in-more-submenu="true" data-level="2">Contact us</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc-2023/venue" data-url="/view/nc-2023/venue" data-type="1" data-in-more-submenu="true" data-level="2">Venue</a></div></div></li></ul></div></li></ul></nav><div jscontroller="gK4msf" class="RBEWZc" jsname="h04Zod" jsaction="rcuQ6b:WYd;JIbuQc:AT95Ub;VbOlFf:HgE5D;FaOgy:HgE5D;MxH79b:JdcaS;" data-side-navigation="false"><div role="button" class="U26fgb mUbCce fKz7Od iWs3gf Wdnjke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="R9oOZd" aria-label="Open search bar" aria-disabled="false" tabindex="0" data-tooltip="Open search bar" aria-expanded="false" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe tCHXDc YSH9J" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div></div></div><div jsname="mADGA" class="zDUgLc"></div></div><div class="TxnWlb" jsname="BDdyze" jsaction="click:LUvzV"></div></div></header><div role="main" tabindex="-1" class="UtePc RCETm" dir="ltr"><section id="h.32a03f15c00ef3ad_16" class="yaqOZd LB7kq cJgDec nyKByd O13XJf KEFykf" style=""><div class="Nu95r"><div class="IFuOkc" style="background-position: center center; background-image: url(https://lh3.googleusercontent.com/wpMfcrZBs9fVUuvhvozpmt1s1bHn_OSaEc30UecKCPWjY7WQ03JO135K7-P7joznYSxAwPTacNXDnw0v5xOHPDI=w16383); background-size: cover;" jsname="LQX2Vd"></div></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.32a03f15c00ef3ad_19" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe lkHyyc"><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: center;"><span class="jgG6ef C9DxTc " style="color: #ffffff; font-family: &#39;Times New Roman&#39;, Arial; font-variant: normal; font-weight: 700; vertical-align: baseline;">Welcome to NC 2023</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 4.0pt; margin-top: 18.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: center;"><span class="jgG6ef C9DxTc " style="color: #ffffff; font-family: &#39;Times New Roman&#39;, Arial; font-variant: normal; font-weight: 700; vertical-align: baseline;">11</span><span class="C9DxTc " style="color: #ffffff; font-family: &#39;Times New Roman&#39;, Arial; font-size: 10.799999999999999pt; font-variant: normal; font-weight: 700; vertical-align: super;">th</span><span class="jgG6ef C9DxTc " style="color: #ffffff; font-family: &#39;Times New Roman&#39;, Arial; font-variant: normal; font-weight: 700; vertical-align: baseline;"> International Conference of Networks and Communications (NC 2023)</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: center;"><span class="C9DxTc " style="color: #ffffff; font-family: Arial; font-size: 13.5pt; font-variant: normal; font-weight: 700; vertical-align: baseline;">July 29 ~ 30, 2023, London, United Kingdom</span></p><br><br></div></div></div></div></div></div></div></div></div><div class="DnLU4" jsaction="JIbuQc:v5IJLd(ipHvib);"><div role="button" class="U26fgb mUbCce fKz7Od HqAAld Wew9ke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="ipHvib" aria-label="Scroll down" aria-disabled="false" tabindex="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="XE8yyf" viewBox="0 0 24 24" focusable="false"><path d="M7.41 7.84L12 12.42l4.59-4.58L18 9.25l-6 6-6-6z"/><path d="M0-.75h24v24H0z" fill="none"/></svg></span></span></div></div></section><section id="h.32a03f15c00ef3ad_411" class="yaqOZd lQAHbd"><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.32a03f15c00ef3ad_408" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p id="h.bxy8j78k1qub" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.9224799999999997; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: center;"><span class="C9DxTc " style="color: #ffffff; font-family: &#39;Times New Roman&#39;, Arial; font-size: 13.999999999999998pt; font-weight: 400; vertical-align: baseline;">Accepted Papers</span></p><br></div></div></div></div></div></div></div></div></div></section><section id="h.32a03f15c00ef3ad_415" class="yaqOZd"><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.32a03f15c00ef3ad_412" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p id="h.ojk1su7jlzp8" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Digital Circuit Correlation Optimization of Neural Networks for Apnea Detection During Transplantation</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Xu Lin</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1,*</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Heng Li1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">,*</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Yukun Qian</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Yun Lu</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Mingjiang Wang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">College of Electronic and Information Engineering, Harbin Institute of Technology (Shenzhen), Shenzhen, China, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">*</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">These authors contributed to the work equally and should be regarded as co-first authors and </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">School of Computer Science and Engineering, Huizhou University, Huizhou, China</span></p><p id="h.dejv0fw6s087" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Sleep apnea syndrome (SAS) is a dangerous and high incidence sleep disorder. As more and more people are affected by SAS, monitoring SAS in family life becomes increasingly important. It is very meaningful to design an automatic SAS monitoring device. We designed a SAS detection model based on neural network, and transplanted the model to an application specific integrated circuit (ASIC). There are many problems in the process of transplanting neural network to ASIC. One of the most serious problems is the transplantation of nonlinear activation functions. We proposed a software-hardware joint optimization method to solve the problem of activation function in the SAS model transplantation. In the process of building the neural network model, our research modified the activation function in the traditional LSTM model and the attention mechanism, and adopted hard-sigmoid and Leaky-ReLU activation function for digital circuits. In the hardware transplantation, the activation function was constructed using the binary shift-based division, three-segment and two-segment function. A digital circuit without migration errors can be obtained with a small area and time consumption. We jointly optimized the structure of the model design and the digital circuit implementation. The model was more suitable for the digital circuit structure, so that the neural network can be transplanted more smoothly.</span></p><p id="h.8i93holsaeaa" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Sleep apnea detection, Neural network, Hardware transplantation, Activation function.</span></p><p id="h.g08rrej8b8xr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">From 3D Point Cloud Towards Hbim. The Role of Artificial Intelligence in Cultural Heritage: a Literature Review</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Victoria Andrea Cotella, Department of Architecture, University of Naples Federico II, Naples, Italy</span></p><p id="h.pzickbjk8zs0" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">In recent years, interest in the automatic semantic segmentation of 3D point clouds using machine and deep learning (ML/DL) has grown due to its fundamental role in scene understanding in various computer vision, robotics and remote sensing applications. In the architecture, engineering and construction (AECO) sector, Building Information Modelling (BIM) has become a standard approach to design and the use of 3D point clouds is currently the basis for the creation of as-built BIM models. Today, there is a research gap concerning the interface between point cloud segmentation and the Historical BIM process: there are no consistent studies demonstrating the possibility of automating the modelling of BIM families from the result obtained in the segmentation process in terms of geometry and semantic labels. Based on these assumptions, the present research aims to conduct a systematic review of the state of the art, including both empirical and conceptual studies, with the goal of offering a constructive synthesis that will provide a starting point for the development of innovative approaches in the field of BIM and AI.</span></p><p id="h.7jzo0pie4gbn" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Artificial Intelligence, 3D Point cloud, HBIM, Cultural Heritage, Digitalisation.</span></p><p id="h.mx5u8ebuhw4p" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Review of Class Imbalance Dataset Handling Techniques for Depression Prediction and Detection</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Simisani Ndaba, Department of Computer Science, Faculty of Science, University of Botswana</span></p><p id="h.dl8de0vufn7z" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Depression is a prevailing mental disturbance affecting an individual’s thinking and mental development. There have been many researches demonstrating effective automated prediction and detection of Depression. The majority of datasets used suffer from class imbalance where samples of a dominant class outnumber the minority class that is to be detected. This review paper uses the PRISMA review methodology to enlist different class imbalance handling techniques used in Depression prediction and detection research. The articles were taken from information technology databases. The results revealed that the common data level technique is SMOTE as a single method and the common ensemble method is SMOTE, oversampling and under sampling techniques. The model level consists of various algorithms that can be used to tackle the class imbalance problem. The research gap was found that under sampling methods were few for predicting and detecting Depression and regression modelling could be considered for future research.</span></p><p id="h.8vrjq5y884p8" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Depression prediction, Depression detection, Class Imbalance, Sampling, Data Level and Model Level.</span></p><p id="h.pptd92joobj6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Mobile Platform for Teachers and Parents to Track Children’s Behavior During Online Classes Using Artificial Intelligence</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Ziqi Liu</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Yujia Zhang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The Governor’s Academy, 1 Elm St, Byfield, MA 01922, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA91768</span></p><p id="h.j385icv08ol6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Online schooling has become more and more popular during recent years due to COVID-19 [1][15]. It allowsteaching to continue without in-person contacts. A prominent issue with online schooling is teachers are unabletooversee students’ behavior during class as they would in-person. It has been known that many students tend toloseattention. This can make online schooling less ef ective, causing itci to yield worse results than in-person schooling[2]. In order to tackle this issue, this paper outlines a tool that has been developed to monitor children’s mouse andkeyboard movements during online classes and analyze the data with artificial intelligence to ensure students arefocused in class [3]. For example, if the students are typing and clicking their mouse frequently, then there is ahigher possibility the student is not focused because frequent keyboard and mouse movements might indicate theyare chatting with friends or playing games; on the other hand, if they are attentive in class, there would be lesskeyboard and mouse movements, as they should be taking notes.</span></p><p id="h.zbrsohrjpq9x" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Depression prediction, Depression detection, Class Imbalance, Sampling, Data Level and Model Level.</span></p><p id="h.fnudqpi6klg6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Exploring the Role of Extracted Features in Deep Learning-based 3D Face Reconstruction From Single 2D Images</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Mahfoudh Batarfi and Manohar Mareboyana, Department Of Computer Science, Bowie State University, Bowie, MD, USA</span></p><p id="h.gxxfwwbrhz49" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Features that can be extracted from a single image are very important in 3D face reconstruction neural networks because they provide additional information beyond the image’s size and quality. These features can be used to compensate for the lack of prior knowledge provided by a single 2D image and to overcome the dimensional differences between 2D and 3D. This paper collects features that can be extracted from a single image include facial landmarks, which provide information about the geometric structure of a face, and texture maps, which provide information about the surface properties of a face. Additionally, depth maps, shading information, and albedo maps can be used to understand the 3D structure of the face and how light interacts with it. By using these features, 3D face reconstruction neural networks can create more detailed and accurate 3D models of faces, even when the input image is of low quality or has extreme poses or occlusions.</span></p><p id="h.bu42siz2hg7t" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Landmarks, Depth, Texture, UV, Shading, Albedo,Face Parsing.</span></p><p id="h.d9538vtltdqr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Max-policy Sharing for Multi-agent Reinforcement Learning in Autonomous Mobility on Demand</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Ebtehal T. Alotaibi</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Michael Herrmann</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1, 2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Institute of Perception, Action and Behaviour, Edinburgh, UK, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, Imam Mohammad Ibn Saud University, Riyadh, Saudi Arabia</span></p><p id="h.2rus3kizq2nd" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Autonomous Mobility on Demand (AMoD) systems have the potential to revolutionize urban transportation by offering customers mobility as a service without the need for car ownership. However, optimizing the performance of AMoD systems presents a challenge due to competing objectives of reducing customer wait times and increasing system utilization while minimizing empty miles. To address this challenge, this study compares the performance of max-policy sharing agents and independent learners in an AMoD system using reinforcement learning. The results demonstrate the advantages of the max-policy sharing approach in improving Quality of Service (QoS) indicators such as completed orders, empty miles, lost customers due to competition, and out-of-charge events. The study identifies the importance of striking a balance between competition and cooperation among individual autonomous vehicles (AVs) and tuning the frequency of policy sharing to avoid suboptimal policies. The findings suggest that the max-policy sharing approach has the potential to accelerate learning in multi-agent reinforcement learning systems, particularly under conditions of low exploration.</span></p><p id="h.aziiktg8idhx" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">reinforcement learning, multi-agent, consensus learner, max-policy sharing, autonomous mobility on demand.</span></p><p id="h.8x9aqfy1k9yg" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Improved Speech Enhancement by Using Both Clean Speech and ‘clean’ Noise</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Jianqiao Cui and Stefan Bleeck, Institute of Sound and Vibration Research, University of Southampton, Southampton, UK</span></p><p id="h.x6rcoza9jcai" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Generally, speech enhancement (SE) models based on supervised deep learning technology use input features from both noisy and clean speech, but not from the noise itself. In this paper, we propose that the clean background noise, before mixing with speech, can also be utilized to improve SE, which has not been described in previous literature to our knowledge. Our proposed model initially enhances not only the speech but also the noise, which is later combined for improved intelligibility and quality. We also present a second innovation to capture better contextual information that traditional networks often struggle with. To leverage speech and background noise information, as well as long-term context information, we describe a sequence-to-sequence (S2S) mapping structure using a novel two-path speech enhancement system consisting of two parallel paths: a Noise Enhancement Path (NEP) and a Speech Enhancement Path (SEP). In the NEP, the encoder-decoder structure is used to enhance only the clean noise, while the SEP is used to suppress the background noise in the clean speech. In the SEP, we adopt a Hierarchical Attention (HA) mechanism to capture long-range sequences more effectively. In the NEP, we utilize a traditional gated controlled mechanism from ConvTasnet but improve it by adding dilated convolution to increase receptive fields. We conducted experiments on the Librispeech dataset, and the results show that our proposed model outperforms recent models in various measures, including ESTOI and PESQ scores. We conclude that the simple speech plus noise paradigm often adopted for training such models is not optimal.</span></p><p id="h.ojqczzqbgfl9" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Supervised speech enhancement, separate paths, hierarchical attention mechanism, gated control, magnitude.</span></p><p id="h.cc9s0c72sgak" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Can Complexity Measures and Instance Hardness Measuresreflect the Actualcomplexity of Microarray Data?</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Omaimah Al Hosni, Andrew Starkey, School of Engineering, University of Aberdeen, Scotland/UK</span></p><p id="h.2uh5baaixozr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">This study aims to examine the performance of Complexity Measures andInstance Hardness Measures in Microarray dataset properties. The study assumes that since these measures are data dependent, they might also be negatively affected by complex datacharacteristics in not reflecting the actual data complexity.In addition, the study argues that the experiment strategy adopted mainly by others in examining only the correlation between the classification algorithm and measures performance is not a good independent indicator to validate the measures performance in estimating the actual data difficulty nor for showing the causes of the poor prediction of the learning algorithms performance as both are data dependant. Therefore, the study adopted a different experiment strategy than other works undertaken in this context. The outcomes indicated thatAmong 35 measures covered in this study, the measures had responded differently against each data challenge due to the different assumptions they adopted and their sensitivity to the different data challenges.</span></p><p id="h.eqi44s2syahl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Complexity Measures, Instance Hardness Measures, Small Sample size, High Dimensionality, Imbalanced Classes, Microarray dataset.</span></p><p id="h.w2abi8283p73" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Pose-estimate Smart Home Heating Control System Based on Body Cover Detection Using Artificial Intelligence and Computer Vision</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Tingyu Zhang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Jonathan Sahagun</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Materdei High School, 1202 W Edinger Ave, Santa Ana, CA 92707, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.v0fmup1vleuk" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The background to the problem we are trying to solve is the need for a reliable and affordable baby monitor that provides parents with real-time information on their babys condition and wellbeing [1]. While there are various baby monitors on the market, many of them have limitations such as limited range, poor connectivity, and lack of features [2]. Our proposal is to develop a smart baby monitor that incorporates a range of technologies such as Wi-Fi connectivity, temperature and humidity sensors, audio and video monitoring, and a smartphone app for remote monitoring and control [3]. Our device also includes features such as a nightlight, lullabies, and two-way communication, making it a comprehensive solution for parents. One of the main challenges we faced was ensuring that the devices connectivity was reliable and stable, particularly when transmitting data wirelessly over Wi-Fi. We addressed this challenge by using high-quality components and optimizing the devices firmware to ensure optimal performance [4]. During experimentation, we tested the device in various scenarios such as different room sizes, WiFi network setups, and environmental conditions. The results showed that the device performed reliably and accurately in all scenarios, providing parents with real-time updates on their babys condition and wellbeing. The most important results we found were that our device provided parents with a comprehensive and reliable solution for monitoring their babys condition and wellbeing. Our devices features, such as video monitoring and smartphone control, made it easier for parents to stay connected with their baby, even when they were not in the same room [5]. Our idea is ultimately something that people should use because it provides parents with peace of mind, knowing that they can monitor their babys condition and wellbeing in real-time, even when they are not in the same room. Additionally, our devices comprehensive features, such as video monitoring and two-way communication, make it a valuable tool for parents to use as their baby grows and develops [6].</span></p><p id="h.o58y737cqeo" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Monitor, AI, Senser, baby.</span></p><p id="h.uoopefyader" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Automated Models for the Classification of Magnetic Resonance Brain Tumour Images</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Divya S</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Dr Athar Ali</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> , Dr Nasir Ibrahim</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Dr L Padma Suresh</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">4</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Computing, University of Buckingham, UK, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Computing University of Buckingham, UK, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Computing University of Buckingham, UK, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">4</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of CSE, Baselios Mathew II College of Engineering, India</span></p><p id="h.enok4rcewxvr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Brain tumours are the second largest cause of cancer death in children under the age of 15 and young adults until age 34. Also, among people over 65, these tumours are the second-fastest-growing cause of cancer death. Computer-assisted tumour diagnosis is challenging, and efforts to increase the accuracy of tumour classification and generalisation are continually being made despite the plethora of studies conducted. This study of automated multi-class brain tumour classification utilising Magnetic Resonance Images aims to design and develop three automatic brain tumour classification approaches to categorise the brain tumours as glioma, meningioma, and pituitary tumours, which assist clinicians in making brain tumour diagnoses and developing further treatment plans to save patient’s life. This research proposes methodologies such as a transfer learning approach using ResNet 50, hand-crafted features with machine learning classifiers, and hybrid firefly optimised multi-class classifier for tumour classification.The hybrid methodology yields the highest classification accuracy of 99% using the Figshare dataset. Furthermore, using the Figshare dataset, the hybrid technique yields the highest sensitivity (recall) of 99% for meningioma and pituitary tumours, the highest precision of 100% for pituitary tumours, and the highest F1-measure of 99% for pituitary tumours.</span></p><p id="h.co0bhug3arb7" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Brain Tumour Classification, Meningioma, Glioma, Pituitary, Deep Learning, Machine Learning, Resnet 50, MRI.</span></p><p id="h.18o0vt7i94ou" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">An Empirical Study on the Impact of Augmented Reality Technology on Improving Learning Motivation in E-learning Platform</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Thayalini Majureshan, Department of Computer Engineering, AIMS Campus, Colombo, Sri Lanka</span></p><p id="h.jbrlrg240t1d" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">AR has the advantage of being able to reflect on real-life situations, allowing it to go beyond any potential limitations. To obtain a better knowledge of each subject, students can begin exploring them in the actual world using a simple AR simulation. However, research on the effects and outcomes of augmented reality in education is still in its early stages. The impact of augmented reality on learning motivation is the topic of this study. An AR-based eBook based on both the local and international school curriculum for grade 1 social science subjects has been produced to test the impact on learning motivation. 96 first-graders from six different schools were chosen for this study and evenly divided into two groups. The experimental students used AR-based learning materials, while the control students used 2D image-based learning resources. A variety of statistical analyses were performed, and the results revealed a statistically significant difference in ARCS aspects of learning motivation between the control and treatment groups, implying that using AR technology boosts learning motivation by 34.54 percent more than the traditional method. This discovery could aid researchers, educators, and industrialists in developing models, techniques, and materials to raise the primary educational standard as a revolution.</span></p><p id="h.slo2kz54o7dd" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Immersive Technology, Augmented Reality, AR, 2D, 3D, Learning Motivation, Attention, Relevance, Confidence, Satisfaction, Primary School.</span></p><p id="h.cvo3xrfmbg71" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Exploring the Synergistic Integration of Artificial Intelligence and Dropshipping: A Comprehensive Investigation Into Optimizing Supply Chain Management, Enhancing Customer Experience, and Maximizing E-commerce Profitability Through Aidriven Solutions</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Rundong Wang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Lin Yang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Patrick Le</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The Webb School of California, 1175 W Baseline Rd, Claremont, CA 91711, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">C13711 Somerset Ln SE, Bellevue, WA 98006, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.g2m32ejd3qym" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The dropshipping industry presents significant challenges for entrepreneurs, particularly in product selection, website creation, and overall management of their online stores [1]. The sheer volume of products available, fierce competition, and the complexities of inventory management and customer service can be overwhelming for newcomers [2][3]. To address these issues, we propose a unique, AI-powered dropshipping platform that not only automates and optimizes essential aspects of running a dropshipping business but also offers a feature that distinguishes it from others: personalized website generation [4]. Our platform uses cutting-edge technologies such as artificial intelligence, machine learning, and data analytics to streamline operations and increase efficiency. It comprises essential components, including data acquisition via sophisticated web scraping techniques, AI analytics that use machine learning algorithms and mathematical formulas for data analysis and product performance prediction, and user interface generation, focusing on creating a user-friendly interface for straightforward navigation and informed decision-making [6]. What sets our platform apart is its ability to generate personalized websites based on the users chosen items to dropship. This unique feature enhances advertising capabilities by offering a tailored online presence that displays selected products in an engaging and persuasive way. These generated websites are visually appealing, user-friendly, and SEO-optimized for maximum exposure, enabling better engagement with the target audience, increasing conversions, and driving sales [5]. Our AI-powered dropshipping platform is more than a tool; its a comprehensive solution that allows dropshippers to efficiently manage their business, from product selection to website creation and advertising [7]. By enabling entrepreneurs to focus more on marketing and customer relationships, it contributes to increased efficiency and higher success rates. It satisfies the growing demand for personalized online experiences, empowering dropshippers to tailor their online stores to their specific niche or target market, thereby enhancing their branding in a highly competitive e-commerce landscape. In conclusion, our platform provides an effective solution to the challenges faced by dropshipping entrepreneurs. Its unique website generation feature, along with accurate product selection, scalability, and user-friendly interface, contribute to improved profitability, customer satisfaction, and long-term growth in the competitive drop shipping industry. The integrated approach of our solution eliminates the need for dropshippers to rely on multiple tools, thereby simplifying operations and reducing complexity, ultimately enhancing their success.</span></p><p id="h.2oqugiw02tah" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Automation, Artificial intelligence, Web scraping, User interface design/generation.</span></p><p id="h.fuiwv2tr4kje" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Study of a Genetic Algorithm for the Analysis of Data From the Abs Polymer Creep Test</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Thiago Moreira da Silva</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Manoela Rabello Kohler</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Marco Aurelio Cavalcanti Pacheco</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Eletrical Engineering, Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Rua Marquês de São Vicente, 225, Gávea, RJ-Brasil</span></p><p id="h.ef2ahmdcbtre" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">In this paper, a genetic algorithm was proposed in order to compare it with experimental data and non-linear regression analysis for the creep test of ABS polymer and Br-ABS. The results of the correction coefficients were very close showing that genetic algorithms are a good tool for regression analysis. For the analysis, an attempt was made to model the data based on Burgers four-parameter model.</span></p><p id="h.7app4ae4ypvu" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">ABS, flame retardant, creep, viscoelasticity, Genetic algorithms.</span></p><p id="h.y4mp6mhsuai7" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">The Introduction of Seasonal-trend Decomposition Technique Integrated With Tvf-emd and Longshort Term Memory Network in Monthly Rainfall Forecasting</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Zixuan Jin</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Bei Wang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">sucsoft, Hangzhou, Zhejiang, China, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">College of Computer Science, Zhejiang University, Zhejiang, China</span></p><p id="h.t41la62xxvcp" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Many efforts are carried out to acquire accurate rainfall forecasting to alleviate the damaging effects of extreme weather conditions. We introduced a new multi-decomposition-based technique to forecast monthly rainfall in Hangzhou, China. Firstly, the original rainfall signals were decomposed into trend, seasonal, and remainder components via seasonal-trend decomposition using LOESS (STL). In addition, the residual part was decomposed into intrinsic mode decomposition functions (IMFs) by the time-varying filter-based empirical mode decomposition (TVF-EMD). Then, we used the Principal Components Analysis (PCA) to decompose the IMFs signals. Multiple machine learning (ML) models, i.e. long-short term memory (LSTM), were developed to predict these three components. We added the predicted value of each component as the predicted monthly rainfall. Lastly, several statistical metrics, i.e. the root mean squared error (RMSE), were used to evaluate the performance of the ML models. The results show that the STLTVF-EMD-PCALSTM outperformed the benchmark models in predicting monthly rainfall.</span></p><p id="h.325uob53plzt" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Rainfall time series prediction; Seasonal-trend decomposition; Empirical mode decomposition; Deep learning.</span></p><p id="h.hn6u50qte49x" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">On the Robustness of Federated Learning Towards Various Attacks</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Mayank Kumar</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Shrey Yagnik</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Priyanka Singh</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Indian Institute of Technology Jammu, Jammu, India, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, Gujarat, India</span></p><p id="h.1c5cz2jxc51j" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Federated Learning (FL) allows for training machine learning models on decentralized data. However, FL has been prone to adversarial attacks. This paper examines the vulnerability of FL towards white-box attacks using the CIFAR10 dataset. In the study, we have used ResNet20 and DenseNet. In the study, the required perturbation is added to find the adversarial samples to fool the model. This decentralized approach to training can make it more dif icult for attackers to access the training data, but it can also introduce new vulnerabilities that attackers can exploit. We conducted three types of white box attacks, i.e., Fast Gradient Sign Method (FGSM), Carlini-Wagner (CW), and DeepFool, and studied the models behavior. We have presented the results of the model behavior considering the dif erent scenarios.</span></p><p id="h.a5kk9i6my2w8" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Federated Learning, Machine Learning, White-Box Attacks.</span></p><p id="h.58e8eyxqjs57" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">License Plate Recognition for Smart Parking</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Djalal Merad Boudia, Kheira Ziadi and Assia Touati, Department of Computer Science, Ain-Témouchent University, Algeria</span></p><p id="h.vfn0j1cyji4u" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Nowadays, in addition to the flexibility, efficiency, speed and comfort of the private car, the spatial dispersion of the habitat and their activities contribute to a considerable growth in traffic and the use of cars. This means of transport becomes the most popular and most preferred by users. For this, the automation of parking management is necessary because the human being is unable to identify, in real time and without mistakes, the cars that enter a safe place. Today, there are many systems of recognition of license plates, these systems have two major axes, which are the detection of the license plate and the recognition of its characters. Our system makes it possible to identify cars in a car park by reading the license plates. It relies on a camera associated with a plate recognition software and a database that contains the list of incoming and outgoing cars. First, pretreatments are applied to facilitate subsequent image analysis. We start with the detection of all areas that could be plates and then a procedure of recognition is applied in order to obtain the registration of the car.</span></p><p id="h.bj6eutexdcf" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Smart Parking, wireless sensor network, character recognition, image processing, license plate.</span></p><p id="h.i3lzeywpkn1r" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Semantic Framework for Query Synthesised 3D Scene Rendering</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Sri Gayathri Devi I, Sowmiya Sree S, Jerrick Gerald, Geetha Palanisamy, College of Engineering, Anna University, Chennai, India</span></p><p id="h.j943p6t4ji1s" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">View synthesis allows the generation of new views of a scene given one or more images. Current methods rely on multiple input images which are practically not feasible for such applications. Whereas utilizing a single image to generate the 3D scene is challenging as it requires comprehensive understanding of 3D scenes. To facilitate this, a complete scene understanding of a single-view image is performed using spatial feature extraction and depth map prediction. This work proposes a novel end-to end model, trained on real images without any ground-truth 3D information. The learned 3D features are exploited to render the 3D view. Further, on querying, the target view is generated using the Query network. The refinement network decodes the projected features to in-paint missing regions and generates a realistic output image. The model was trained on two datasets namely RealEstate10K and KITTI containing an indoor and outdoor scene.</span></p><p id="h.rz2cya7z9lnr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">3D Scene Rendering, Dif erentiable Renderer, Scene Understanding, Quantized Variational Auto Encoder.</span></p><p id="h.erweyrmlhn4" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Strategies for Addressing Prosopagnosia as a Potential Solution to Facial Deepfake Detectiont</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Fatimah Alanazi, Richard Davison, Gary Ushaw, and Graham Morgan, School of Computing, Newcastle University, Newcastle upon Tyne, UK</span></p><p id="h.i3n4c5b4sp3y" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The detection of deep fakes simulating human faces for potentially nefarious purposes is an ongoing and evolving topic of interest. Research in prosopagnosia, or face-blindness, has indicated that specific parts of the face, and their movement, provide clues for identification to subjects with the condition. This paper outlines studies in the area of detecting and addressing the effects of prosopagnosia. For the first time, we suggest that the findings of these studies could be applied to the detection of deep fake faces, drawing a link between the facial features and movements most useful in combating the effects of prosopagnosia, with the features most productive for analysis in deep fake facial detection.</span></p><p id="h.qdmpmdeoyw5r" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Deep fake detection, Facial recognition, Prosopagnosia, Deep learning &amp; Biometric.</span></p><p id="h.3zug7m93mayl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Systems Engineering Based Augmented Reality Ultra-high-definition Holographic Head-up Display Layout</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Jana Skirnewskaja and Timothy D. Wilkinson, Electrical Engineering Division, Department of Engineering, University of Cambridge, 9 JJ Thomson Avenue, Cambridge, CB3 0FA, UK</span></p><p id="h.emh5kd6i9j9o" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Systems engineering based real-time head-up displays can increase safety and promote inclusivity in transportation. This works utilizes accelerated algorithms, a 4k spatial light modulator, virtual Fresnel lenses, a He-Ne laser resulting in the augmented reality floating holographic projections to appear within 0.9 seconds. Additionally, the personalised layout of the 3D head-up display is a paramount to this work. A robustness analysis based on Failure Mode and Effects Analysis (FMEA) was carried out. The study consisted of optical system architecture design and a failure-cause correlation. In addition, in-depth analyses of each system component were created within the optical setup boundary. The 3D floating holographic projections were assessed based on consumer demand, safety and comfort, and a cost/benefit analysis.</span></p><p id="h.aq88r7d10mic" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Augmented Reality, Systems Engineering, FMEA, 3D Computer-Generated Holography, Head-Up Displays, Automotive Applications.</span></p><p id="h.w3do6mur804s" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Learning Weight of Loss on Multi-scale in Crowd Counting</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Derya UYSAL and Ulug Bayazit, Department of Computer Engineering, Istanbul Technical University, Istanbul, Turkey</span></p><p id="h.s5k71lvn2j3z" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">In this work, we improve the state-of-the-art in crowd counting by further developing a recently proposed multi-scale, and multi-task crowd counting approach. While most of the studies treat density-based architectures, this study proposed a point-based method for crowd analysis. We propose automatic, and optimal weight assignment to constituents of the loss function. This approach, which is applied to each patch, ensures that the weight parameters are updated in each epoch, and added to the optimizer with model parameters rather than remaining constant. For validation of our proposed approach, we use three popular crowd counting datasets, ShanghaiTech A, ShanghaiTech B, and UCF_CC_50. The performance of our approach exceeds the performances of the other studies on the ShanghaiTech dataset, and is highly competitive with the performances of the other studies on the UCF CC 50 dataset.</span></p><p id="h.3xj14bmy2mq9" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Crowd Counting, Multi Scale, Automatic Weighted Loss, Point Supervision.</span></p><p id="h.9x0xifba9d32" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Optimizing Heat Generation and Battery Efficiency for Portable Heaters: A Comparative Study of Copper Wire Gauges and Battery Capacities</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Matthew King</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Jonathan Sahagun</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">University high school, 4771 Campus Drive, Irvine 92612, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.60v61wr110fr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Heated jackets are a popular clothing item among outdoor enthusiasts, athletes, and workers who need to work outside in cold weather [1]. They offer a convenient and effective way to stay warm in cold temperatures, while also providing therapeutic benefits for those who suffer from certain medical conditions [2]. However, existing methods and tools can be expensive and bulky, and some may not provide even heat distribution. A new approach to creating a heater that can be added to any existing jacket and powered by plugging into a wall socket or connecting to a battery source offers a practical, flexible, and cost-effective solution to the need for warmth in cold weather [3]. This approach allows users to easily add heating elements to their existing clothing, without the need to purchase a new jacket or invest in expensive heated clothing. The option to power the heater through a wall socket or battery source offers flexibility and convenience for users who may not have access to a power source when they need it [4]. Overall, the innovative approach to adding heating elements to existing jackets offers a practical, flexible, and cost- effective solution to the need for warmth in cold weather.</span></p><p id="h.b7hjogzdhacj" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Heat generation, Battery efficiency, Customization, Optimization.</span></p><p id="h.5155g3gfaet8" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Underwater Object Detection</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Akshata Kumble, Sriveda Medatati, Dr. Shruthi M L J, Department of Electronics and Communication, PES University, Bangalore, India</span></p><p id="h.vezox5aq5a14" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Underwater object detection is a challenging task in computer vision, as traditional methods may struggle to detect objects reliably due to the high levels of background noise and clutter present in underwater environments. To address this problem, we propose an underwater object detection method based on the &quot;You Only Look Once&quot; (YOLO) v5 algorithm. Our approach aims to balance accuracy and speediness for target detection in marine environments, specifically targeting fishes, pipelines, rocks, and other obstacles that could impede the functioning of submarines. We trained and evaluated the YOLOv5 model on a dataset of underwater images, achieving a mean average precision (mAP) of 0.84 on a separate test set. The results show that our proposed approach is effective for underwater object detection and could have applications in marine biology, oceanography, and underwater exploration.</span></p><p id="h.32lg4gsfrw3p" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">YOLO v5, object detection, deep learning, convolutional neural networks, IOU, object classification.</span></p><p id="h.9o0b0mvqb8an" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Befitting Single-player Squash Program to Educate and Assist Disabled/autistic People Using Pose Estimation and Unity</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Lung Ngok Fung</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Moddwyn Andaya</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Independent Schools Foundation, 1 Kong Sin Wan Road, Pokfulam, Hong Kong, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.hdp9qdr5w08" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The COVID pandemic has had a notable impact on sports education and exercise over the past few years [7]. Many students have lost access to physical education classes due to school closures or virtual instruction. This paper develops an application using pose estimation that allows users to experience a digital squash game that involves body movements on their phones or computers. Using post estimation, this application can track and identify player movements that let players control game avatars with their movements [8]. A crucial factor that deserves consideration is the degree of difficulty a game offers. The game has a bot as an opponent that can score points precisely. The game may make it easier for the player to move in the direction of the squash ball in order to lessen the challenge that the bot presents. In the experiment, the efficacy of post estimation was tested. In twenty-five swings, all swings were successfully accomplished. With the pandemic restricting access to public sports facilities and other fitness facilities, the application provides a convenient way to exercise from home and the opportunity to learn more about squash.</span></p><p id="h.5pdzwomkg2fv" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Pose Estimation, Unity, Single-player, Squash.</span></p><p id="h.kxxnwkaryqwf" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Pose-based Walking/running Coach System for Cerebral Palsy Patients Using Artificial Intelligence and Computer Vision</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Edward Zhu</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Yu Sun</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Chinese International School, 1 Hau Yuen Path, Braemar Hill, Hong Kong SAR, China, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.k1b6ky6k6asl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Cerebral palsy, the most common motor disability in childhood, causes mobility issues, leading to gait abnormalities. The spectrum of these abnormalities includes having stiff or flaccid muscles, uncontrollable movements, or poor coordination. Around 1 in 3 children with cerebral palsy cannot walk. Current physical therapy solutions, including processes such as clinical gait analysis, are inaccessible and costly. We investigated the research question: how can we create an affordable and effective method using AI to provide gait analysis data to cerebral palsy patients? Machine learning and computer vision were used to develop a mobile application which provides gait analysis data for cerebral palsy patients. The MediaPipe computer vision library was applied to find pose vectors from the patient’s walking / jogging / running video, and from an expert’s video demonstrating proper form. Using this vector data, matching frames from the two videos were identified with numerous applications of the K-Means algorithm. Joint angle differences were calculated in order to identify gait abnormalities. A complete mobile application was developed to enable patients to monitor, track and get feedback live. The AI model was deployed in the cloud. The frontend was developed using Flutter, and it was designed to accommodate patients’ physical/mental limitations. This research demonstrates an application of machine learning and computer vision in an accessible mobile solution. The K-means algorithm showed high accuracy with an average silhouette score 0.514 when used on expert videos. MediaPipe output had 29.2FPS on average, higher than that of competing libraries which was 8.1FPS.</span></p><p id="h.yjrrbz1yud4w" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Cerebral palsy, Gait abnormalities, Artificial intelligence, Machine learning.</span></p><p id="h.a86xuv2xlx8r" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Depth Based Region Proposal: Multi-stage Real-time Object Detection</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Shehab Eldeen Ayman</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Walid Hussein</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Omar H. Karam</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Software Engineering, The British University in Egypt, Cairo, Egypt, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2, 3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, The British University in Egypt, Cairo, Egypt</span></p><p id="h.emua24x3yatk" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Many real-time object recognition systems operate on two-dimensional images, degrading the influence of the involved objects third-dimensional (i.e., depth) information. The depth information of a captured scene provides a thorough understanding of an object in full-dimensional space. During the last decade, several region proposal techniques have been integrated into object detection. scenes’objects are then localized and classified but only in a two-dimensional space.Such techniques exist under the umbrella of two-dimensional object detection models such as YOLO and SSD. However, these techniques have the issue of being uncertain that an objects boundaries are properly specified intothescene. This paper proposes a unique region proposal and object detection strategy based on retrieving depth information forlocalization and segmentation of the scenes’ objects in real-time manner. The obtained results on different datasets show superior accuracy in comparison to the commonly implemented techniques with regards to not only detection but also apixel-by-pixel accurate localization of objects.</span></p><p id="h.9q7v6gj9iz21" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Real time object detection,region proposal,computer vision, RGBD object detection, two stage object detection.</span></p><p id="h.nmersvvn3cin" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">An Interactive Location Extraction System for Video Analysis Using Opencv and Google Apis</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Cheng Zhou</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Yujia Zhang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Arcadia High School, 180 Campus Dr, Arcadia, CA 91006, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.7mo0m8ywl14" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Video Location Finder is an innovative project developed during the Covid-19 pandemic, inspired by the need to connect with travel destinations while being confined to our homes [4][5]. The project consists of three major components: frame extraction using OpenCV, an artificial intelligence program leveraging the Google Geocoding API to identify locations, and an interactive map display using the Google Maps JavaScript API [6][7]. The system allows users to extract geographic locations from videos, providing latitude and longitude coordinates. These coordinates are then visualized on an interactive map, enhancing the user experience. With its user-friendly website, Video Location Finder revolutionizes the process of exploring and planning future travel adventures by bridging the gap between captivating videos and real-world locations.</span></p><p id="h.trt9sefyc2t6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Artificial intelligence, Web development, Machine learning, Video Analysis.</span></p><p id="h.fc0p772hm82" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Review: Evolution of Fractional Hot Deck Imputation for Curing Incomplete Data From Small to Ultra Large</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">In Cho Cho</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Jae-Kwang Kim</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Yicheng Yang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Yonghyun Kwon</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">4</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, and Ashish Chapagain</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">5</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Civil, Construction, and Environmental Engineering (CCEE), Iowa State University (ISU), Ames, USA, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Statistics (STAT), ISU, Ames, USA, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">CCEE, ISU, Ames, USA, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">4</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">STAT, ISU, Ames, USA, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">5</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">CCEE, ISU, Ames, USA</span></p><p id="h.1povrbbg6gg" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Advancements in machine learning (ML) hinges upon data - the vital ingredient for training. Statistically curing the missing data is called imputation, and there are many imputation theories and tools.Butthey often require difficult statistical and/or discipline-specific assumptions, lacking general toolscapable ofcuring large data. Fractional hot deck imputation (FHDI) can cure data by filling nonresponses with observed values (thus, “hot-deck”) without resorting to assumptions. The review paper summarizes how FHDI evolves to ultra data-oriented parallel version (UP-FHDI).Here, “ultra” data have concurrentlylarge instances (big-n) and high dimensionality (big-p). The evolution is made possible with specialized parallelism and fast variance estimation technique. Validations with scientific and engineering data confirm thatUP-FHDI can cure ultra data(p &gt;10,000&amp; n &gt; 1M) andthe cured data sets can improve the prediction accuracy of subsequent ML. The evolved FHDIwill help promote reliable ML with “cured” big data.</span></p><p id="h.3a02e7z26m3f" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Big Incomplete Data, Fractional Hot-Deck Imputation,Machine Learning, High-Dimensional Missing Data.</span></p><p id="h.yvgj7ttt1fgk" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Content-based Intelligent Chrome Extensiontoassist Reading Time Management Using Artificialintelligence and Machine Learning</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Richard Zhang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Ang Li</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Oakton High School, 2900 Sutton Rd, Vienna, VA 22181 and </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA91768</span></p><p id="h.v171myw54f7x" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Oftentimes we lose track of the time we take to skim over a website or article online or we are simply curious about the time it might take for us to read over some text. We might also be curious about our attention span based onthelength or dif iculty of an article. This paper details the development process of an intelligent google chromeextension capable of gathering data from specific articles and processing the data to estimate the amount of timeneeded to read over an article based on the time it took to read similar or dissimilar articles [10]. This applicationtakes into account the length, readability, average word size, and comparisons to other reading times in order toreturn the most accurate time predictions. The benefit of this application is improved time management as anaccurate prediction of time will be provided.</span></p><p id="h.21lbhrnaa2sq" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Chrome-extension, Time management, Machine learning, Web scraping.</span></p><p id="h.sgh6wtsms3sx" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Trainees Perceptions About Distance Education During the Pandemic of Corona Virus (Covid19) in the Regional Center for Education and Training Careers Daraatafilalet</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Abdelghani ZOUADI, Laboratory of Studies and Research in the Sciences of Education, Didactics and Management, Regional Center for Education and Training Careers Daraa-Tafilalet, Errachidia, Morocco</span></p><p id="h.4q6yrcq3ha5y" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The issue of distance education is of great importance due to the development of mass media and information communication technologies. This importance has grown greater and greater, especially in the period of the coronavirus pandemic (Covid19) which obliged people to stay at home and continue studying online and via different tools. This study aimsis to investigate the trainees perceptions related to distance education at the Regional Center for Education and Training Careers – Daraa Tafilalet (RCETC-DT) during the period of coronavirus (Covid19). The research method included the quantitative approach. The data was collected through a questionnaire from a sample of 41 participants at the department of educational administration and preservice teachers in the RCETC-DT in Errachidia and Ouarzazate, Morocco. The findings indicated that distance education has strengths and weaknesses. They confirmed also that distance education can be more successful if more attention is given to from the official educational authorities.</span></p><p id="h.i04pqe218yqc" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Distance Education, E-Learning, Information Communication Technology, Education &amp;Training, Educational Administration.</span></p><p id="h.aiznod8oiysc" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Empowering IoT Privacy: Exploring Self-Sovereign Identity Solutions</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Maruf Farhan, Dr. Abdul Salih, Northumbria University, United Kingdom</span></p><p id="h.g17winxr7a6u" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Internet of Things (IoT) devices play bigger roles in providing smart, intelligent, and efficient industry solutions. IoT devices typically communicate over the network to perform a variety of activities, for example sharing collected information from the sensors and receiving instructions to perform a specific task. These activities require IoT devices to identify over the network. Verifying identity of IoT devices using traditional methods expose too much information. In case of security breach, malicious actors can use this information to perform impersonation attacks. A better approach to identify IoT devices over the network is required such as Self-sovereign identity (SSI). SSI is typically a decentralized digital identity framework which uses digital identity and verifiable credentials. This paper will explore the use of SSI solution with IoT devices to empower privacy of IoT devices.</span></p><p id="h.3umlkyo862zz" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">IoT, Internet of Things, Self-Sovereign identity, SSI, Decentralized Identifiers, Privacy, Security</span></p><p id="h.wyvk75itufxq" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Design and operation of low energy consumption passive human comfort solutions</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Abdeen Mustafa Omer, Energy Research Institute (ERI), Nottingham, United Kingdom</span></p><p id="h.akpk73j6qbaj" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The rapid growth during the last decade has been accompanied by active construction, which in some instances neglected the impact on the environment and human activities. Policies to promote the rational use of electric energy and to preserve natural non-renewable resources are of paramount importance. Low energy design of urban environment and buildings in densely populated areas requires consideration of wide range of factors, including urban setting, transport planning, energy system design and architectural and engineering details. The focus of the world’s attention on environmental issues in recent years has stimulated response in many countries, which have led to a closer examination of energy conservation strategies for conventional fossil fuels. One way of reducing building energy consumption is to design buildings, which are more economical in their use of energy for heating, lighting, cooling, ventilation and hot water supply. However, exploitation of renewable energy in buildings and agricultural greenhouses can, also, significantly contribute towards reducing dependency on fossil fuels. This will also contribute to the amelioration of environmental conditions by replacing conventional fuels with renewable energies that produce no air pollution or greenhouse gases. This study describes various designs of low energy buildings. It also, outlines the effect of dense urban building nature on energy consumption, and its contribution to climate change. Measures, which would help to save energy in buildings, are also presented.</span></p><p id="h.dg2hp7er5na" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Renewable technologies, Built environment, Sustainable development, Mitigation measures.</span></p><p id="h.4nkci7iz9p4g" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Soft Labels for Rapid Satellite Object Detection</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Matthew Ciolino and Grant Rosario and David Noever, PeopleTec, Inc, USA</span></p><p id="h.gr36o8d4r8zn" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Soft labels in image classification are vector representations of an images true classification. In this paper, we investigate soft labels in the context of satellite object detection. We propose using detections as the basis for a new dataset of soft labels. Much of the effort in creating a high-quality model is gathering and annotating the training data. If we could use a model to generate a dataset for us, we could not only rapidly create datasets, but also supplement existing open-source datasets. Using a subset of the xView dataset, we train a YOLOv5 model to detect cars, planes, and ships. We then use that model to generate soft labels for the second training set which we then train and compare to the original model. We show that soft labels can be used to train a model that is almost as accurate as a model trained on the original data.</span></p><p id="h.dv3xng6c1at9" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Soft Labels, Object Detection, Datasets</span></p><p id="h.y21yoy4x5gyd" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Classifying Galaxy Images using Improved Residual Networks</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Jaykumar Patel, Dan Wu, School of Computer Science, University of Windsor, Ontario, Canada</span></p><p id="h.hw0a339m49hl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The field of astronomy has made tremendous progress in recent years thanks to advancements in technology and the development of sophisticated algorithms. One area of interest for astronomers is the classification of galaxy morphology, which involves categorizing galaxies based on their visual appearance. However, with the sheer number of galaxy images available, it would be a daunting task to manually classify them all. To address this challenge, a novel Residual Neural Network (ResNet) model, called ResNet_Var, that can classify galaxy images is proposed in this study. Subsets of the Galaxy Zoo 2 dataset are used in this research, one contains over 28,000 images for the five-class classification task, and the other contains over 25,000 images for the seven-class classification task. The overall classification accuracy of the ResNet_Var model was 95.35% for the five-class classification task and 93.54% for the seven-class classification task.</span></p><p id="h.neisdwg5jjau" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Galaxy Zoo, Deep Learning, Residual Networks, Galaxy Morphology</span></p><p id="h.rue0jx8vdql" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Enhancing Rocket Travel and Landing Efficiency through AI-Guided Control: A Three-Dimensional Simulation Approach</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Zhenrui Guo</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Andrew Park</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Santa Margarita Catholic High School, 22062 Antonio Pkwy, Rancho Santa Margarita, CA 92688, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.a4wo2hnaylgd" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Launching rockets is a costly and complex task that is prone to a high rate of failure. To help address these challenges, the need for simulations to help emulate reality when developing rockets is crucial to making sure the cost overhead stays as low as possible. Our rocket AI seeks to tackle this challenge through the use of machine learning and a series of emulated phases to demonstrate an AI’s ability to properly operate a rocket. The primary challenge throughout the development of the rocket’s AI is the need to introduce and train for unexpected situations, which is done by training for a generalized variant of the situations in question.</span></p><p id="h.68wja2x1qvti" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Unity, Machine Learning, Rockets, Simulation</span></p><p id="h.7dw6njd9ypo7" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Improving Mass Shooting Survivability: a Systematic Machine Learning Approach Using Audio Classification and Source Localization</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Jevon Mao</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Marisabel Chang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Santa Margarita Catholic High School 22062 Antonio Pkwy, Rancho Santa Margarita, CA 92688, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">,Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.3tjeawlpge25" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Mass shootings have emerged as a significant threat to public safety, with devastating consequences for communities and individuals affected by such events [7]. However, a lack of widespread use of new technological infrastructure poses significant risk to victims [8]. This paper proposes a system to classify and localize gunshots in reverberant indoor urban conditions, using MFCC features and a Convolutional Neural Network binary classifier [9]. The location information is further relayed to users through a mobile client in real time. We installed a prototype of the system in a high school in Orange County, California and conducted a qualitative evaluation of the approach. Preliminary results show that such a mass shooting response system can effectively improve survivability.</span></p><p id="h.8iy9czurkfpm" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Machine Learning, Public Safety, Acoustics, Directioning.</span></p><p id="h.fqe5e0hq39d0" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Top 10 Internet of Things Security Probing Areas</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Puthiyavan Udayakumar, United Arab Emirates</span></p><p id="h.c0cow1gt33c7" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Several domains of our daily lives are rapidly experiencing the Internet of Things, including home appliances, vehicles, industry, education, agriculture, hospitals, environmental monitoring, etc. These domains have reached new peaks and are rapidly growing in popularity. Each aspect of the Internet of things (IoT) has its own marks and milestones, gradually increasing as the technology becomes more advanced and convenient. The Internet of things (IoT) combines various technologies and techniques to create an organized and interconnected world so communication between entities can be done in a better, more efficient, and usable manner. The main characteristics of any technology are its security, privacy, authentication, and trustworthiness for the end users. Security, trust, and confidentiality are crucial in ensuring users satisfaction, and IoT security is chiefly concerned with authentication, confidentiality, and access control. There are several ways to manage IoT security, privacy, and trust, including NFC, RFID, and WSN. However, IoT systems are hampered by a lack of comprehensive security solutions across various vertical application domains due to a lack of comprehensive security solutions. This research paper will focus on the top ten areas that must be secured from a security and privacy standard point for IOT devices to fill this gap.</span></p><p id="h.fphsljllqz57" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Sensors/Devices, Data Processing, Network connectivity, Network Protocols, Wireless Networks, Mobile Networks, Viruses, Worms, Trojan, Hardware-based Root of Trust, Small Trusted Computing Base, Defense in Depth, Compartmentalization, Certificate-based Authentication, Renewable Security, Failure Reporting.</span></p><p id="h.ke7axsqavpzg" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Amadeus Migration Process: a Simulationdriven Process to Enhance the Migration to a Multi-cloud Environment</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Bilel Ben Romdhanne, Mourad Boudia and Nicolas Bondoux, Artificial Intelligence Research, Amadeus SAS, Sophia Antipolis, France</span></p><p id="h.b62zhj5r3h31" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">With the development of the cloud offers, we observe a prominent trend of applications being migrated from private infrastructure to the cloud. Depending on the application’s complexity, the migration can be complex and needs to consider several dimensions, such as dependency issues, service continuity, and the service level agreement (SLA). Amadeus, the travel industry leader, had partnered with Microsoft to migrate its IT ecosystem to the Azure cloud. This work addresses the specificity of cloud-to-cloud migration and the multi-cloud constraints. In this paper, we summarise the Amadeus Migration process. The process aims to drive the migration from an initial private cloud environment to a target environment that can be a public or hybrid cloud. Further, the process focuses on a prediction phase that guides the migration process. This paper expects to provide an efficient decision-making process that guides managers and architects to optimise and secure their migration process while considering micro-services-oriented applications targeting an efficient deployment over multi-cloud or hybrid cloud. The prediction relies on the network simulation to predict applications’ behaviour in the cloud and evaluate different scenarios and deployment topologies beforehand. The objective is to predict migrated applications’ behaviour and identify any issue related to the performance, the application’s dependency on other components, or the deployment in the cloud. The migration process proposed in this paper relies on SimGrid, a toolkit developed by INRIA[52] for distributed application modelling. This framework offers a generic process to model IT infrastructure and can assist cloud-to-cloud migration. Specific attention is given to predictive and reactive optimisations. The first results show predictive optimisations impact on securing KPI and reactive optimisation to optimise the solution cost.</span></p><p id="h.drshmrnue3a3" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Cloud migration, SimGrid, system simulation, app modelling, decision support, cloud deployment strategy.</span></p><p id="h.64ofy5r718e0" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">An Energy-efficient Tunable-precision Floating-point Fused Multiply-add Unit Based on Neural Networks</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Xiyang Sun, Yue Zhao and Sheng Zhang, Key Laboratory of Advanced Sensor and Integrated System, Tsinghua Shenzhen, International Graduate School, Tsinghua University, Shenzhen, 518055, China</span></p><p id="h.vu18pgeb0l31" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Convolutional neural networks have been continuously updated in the last decade, requiring more diverse floating-point formats for the supported domain specific architectures. We have presented VARFMA, a tunable-precision fused multiply-add architecture based on the Least Bit Reuse structure. VARFMA optimizes the core operation of convolutional neural networks and supports a range of precision that includes the common floating-point formats used widely in enterprises and research communities today. Compared to the latest standard baseline fused multiply-add unit, VARFMA is generally more energy-efficient in supporting multiple formats, achieving up to 28.93% improvement for LeNet with only an 8.04% increase in area. Our design meets the needs of the IoT for high energy efficiency, acceptable area, and data privacy protection for distributed networks.</span></p><p id="h.bk8uq0tfukw1" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Fused Multiply-add, Tunable-precision, Distributed Network, Energy Efficiency, IoT.</span></p><p id="h.1twg4899jq06" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Green Computing in Cloud</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Madhusudhan Rao Mulagala</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Saketha Kusuru</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science and Engineering, Lovely Professional University, Phagwara, India, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Electrical and Electronics Engineering, Pondicherry Engineering College, Pillaichavady, India</span></p><p id="h.2qu9z9jit3qb" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Green computing is illustrated because of the examination and sees of arranging, creating, utilizing, and getting rid of PCs, servers, and related frameworks, for example, screens, printers, stock-piling gadgets, and systems administration and correspondences frameworks in a very efficient and able manner and in such a manner on accomplishing the ideal outcome with least or no effect on the climate. The objective of green distributed computing is to hack back the utilization of risky assets, augment vitality intensity all through the item’s time frame and advance the recyclability and reuse of out-of-date stock items and mechanical plant squander. Green distributed computing is regularly accomplished by utilizing the product long life Resource portion strategies or more virtualization systems or Power the board methods. Force is the bottleneck of rising the framework execution. Force utilization is delivering a major issue because of extreme warmth. As circuit speed expands, power utilization develops. The information focuses on working with computing models that have a few applications that require on-request asset provisioning and designation considering time-changing remaining burdens that square measure statically dispensed bolstered top burden qualities, to continue separation and give execution ensures while not giving much consideration to vitality utilization.</span></p><p id="h.qb3xq3hhbc1c" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Cloud computing, Performance, Utilization, Green computing.</span></p><p id="h.jmuwifk5fkv6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Verifiable Data Sharing Scheme for Dynamic Multi-owner Setting</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Jing Zhao and Qianqian Su, Department of Computer Science and Technology, Qingdao University, Qingdao, China</span></p><p id="h.5eop5vphketd" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">One of scenarios in data-sharing applications is that files are managed by multiple owners, and the list of file owners may change dynamically. However, most existing solutions to this problem rely on trusted third parties and have complicated signature permission processes, resulting in additional overhead. Therefore, we propose a verifiable data-sharing scheme (VDS-DM) that can support dynamic multi-owner scenarios. We introduce a management entity that combines linear secret-sharing technology, multi-owner signature generation, and an aggregation technique to allow multi-owner file sharing. Without the help of trusted third parties, VDS-DM can update file signatures for dynamically changing file owners, which helps save communication overhead. Moreover, users independently verify the integrity of files without resorting to a third party. We analyse the security of VDS-DM through a security game. Finally, we conduct enough simulation experiments and the outcomes of experimental demonstrate the feasibility of VDS-DM.</span></p><p id="h.2vb0t8pows9n" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Security, Data Sharing, Dynamic Multi-Owner, Verification</span></p><p id="h.m0yhre3z98ah" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Iot in Practice: Investigating the Benefits and Challenges of Iot Adoption for the Sustainability of the Hospitality Sector</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Nick Kalsi, Fiona Carroll, Kasha Minor, Jon Platts, Cardiff School of Technologies, Cardiff Metropolitan University, Llandaff Campus,Western Avenue, Cardiff, CF52YB</span></p><p id="h.jikhg7skvcd9" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Enhancing the sustainability of the hospitality sector with technology is essential to achieving growth whilst also reducingthe hotel’s impact on the environment. Indeed, the concept of Internet of Things (IoT) has recently gained popularity as a new research topic in a wide variety of industrial disciplines, including the hospitality industry. IoT is being seen and used to transform the hospitality industry for the newly desired sustainable growth. However, it is not all ‘smooth sailing’ as multiple challenges must be addressed by organisations in the hospitality industry when installing IoT. These challenges include cost, security, infrastructure and IoT protocols. Taking into consideration the diversity of IoT applications, the paper will examine IoT’s use in hotels whilst also highlighting the challenges that hotels face when using IoT. In particular, it will cover the effect of cyber security including IoT’s protocol layers, potential monitoring and sensor technologies.</span></p><p id="h.ivwsk3z895mn" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Hotel, Internet of Things (IoT), Sensors, IoT Security, Cloud, compliance, privacy, safety, standard, communication, information.</span></p><p id="h.bpbuk848vkxf" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Framework for SLA Violation Prevention in a Cloud of Things Environment</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Falak Nawaz</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Naeem Khalid Janjua</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">National Computational Infrastructure (NCI), Australian National University, Canberra, ACT, Australia, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Edith Cowan University, Perth, WA, Australia</span></p><p id="h.x303r1n08t3m" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">In the literature, existing approaches use runtime monitoring to detect SLA violation and prediction techniques for SLA violation prediction by using the historic QoS data to predict the future QoS values. However, these approaches do not consider the occurrence of eventsand the impact they will have on SLA violation. Moreover, existing approaches also do not provide any recommendation actions to the SLA manager to prevent violation proactively. These limitations of the current literature need the development of a comprehensive framework that can identify and capture events which impact a services quality/performance and model their effect on QoS attributes to reduce the negative consequences by avoiding SLA violation.In order to address these problems, we propose an SLA violation prevention framework. The proposed framework provides a methodology for recommending suitable actions to the SLA manager for SLA violation prevention. Moreover, the performance and the usefulness of the proposed framework is evaluated and validated by developing a proof of concept and applying it on case studies.</span></p><p id="h.z1hqsuvmrkxm" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Cloud of Things (CoT),Service Level Agreement (SLA), SLA violation, violation prevention,proactive management, Quality of Service (QoS)</span></p><p id="h.1b3oso5x0g5r" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Predicting Stock Prices Using Tweet Frequency and Ai: Leveraging Social Media Insights to Forecast Tomorrows Market Trends</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Zimo Liu</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Lin Yang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Tami Takada</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Beijing No. 12 High School, No. 15 Yize Road Fengtai District, Beijing, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">13711 Somerset Ln SE, Bellevue WA 98006, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.95ekhnfkfyfl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">I use the frequency of the tweet counts of the stock ticker to predict the stock price [1]. Using AI to predict the price with today’s tweet count and the highest and lowest stock price to predict tomorrow’s stock price [2]. The benefits of predicting stock prices are minimizing losses and getting a better idea about making money. But since the price of stocks is hard to predict, analyzing the number of price tickers discussed in social media can help people to know more precisely trends. “They analyzed the activity of 150 companies chosen at random from the S&amp;P 500 Index and noticed a correlation between the number of tweets they sent and their share price [3]. Having observed this, the researchers devised a mathematical model, applied it to an imaginary portfolio and outperformed other financial strategies based on financial analysis by as much as 11%” [4]. This indicates the reliability of predicting stock prices with social media. Compared with some popular methods such as Auto-Regressive Conditional Heteroscedastic or Generalized Auto-Regressive Moving Average, using social media to predict price can consider the effect of social trends on the stock price [5]. Using social media to predict the stock price is not subjective and is much cheaper to computerize.</span></p><p id="h.n7oc0fibe8ux" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Stock Price Prediction, Tweet Frequency Analysis, AI-Based Forecasting, Social Media Trends.</span></p><p id="h.l0bht9euaeeq" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Influence of Wireless Novel Routing Protocol by Using Mdpc Algorithm</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Ayad Hasan Adhab</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> &amp; Naseer Ali Hussien</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Kufa University, Computer Science and Mathematics College, Iraq, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Alayen University, Iraq</span></p><p id="h.mcce111gmvv0" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">This research study investigates the influence of a novel wireless routing protocol that incorporates the MDPC (Multiplicative-Divisive Probabilistic Congestion Control) algorithm. The background of the research stems from the increasing demand for efficient and reliable routing protocols in wireless networks, which face challenges such as limited bandwidth, variable network topologies, and dynamic environmental conditions. The purpose of this study is to evaluate the performance of the proposed routing protocol and assess its effectiveness in addressing these challenges. To achieve this objective, a series of methodologies were employed. First, an in-depth analysis of existing routing protocols was conducted to identify their limitations and areas for improvement. The MDPC algorithm was then integrated into the routing protocol design to enhance its performance in terms of packet delivery ratio, network throughput, and energy efficiency. Extensive simulations were carried out using network simulators, and various performance metrics were measured to assess the efficacy of the proposed protocol. The principal results of this study demonstrate that the wireless routing protocol utilizing the MDPC algorithm exhibits superior performance compared to conventional routing protocols. It achieves higher packet delivery ratio, improved network throughput, and reduced energy consumption, even in challenging network conditions. The MDPC algorithms ability to effectively manage packet routing and mitigate the effects of network congestion and link failures contributes significantly to the overall performance enhancement. The simulations were conducted in controlled environments, and real-world deployment scenarios may introduce additional challenges that need to be addressed. Furthermore, practical implications of implementing the protocol, such as hardware and software compatibility, scalability, and security considerations, should be thoroughly investigated before widespread adoption. The social implications of this research are noteworthy, as the proposed wireless routing protocol has the potential to enhance communication reliability and efficiency in various domains. Improved wireless network performance can enable seamless connectivity and data exchange, leading to advancements in areas such as telemedicine, autonomous vehicles, and remote sensing. Additionally, the protocols energy efficiency benefits contribute to the reduction of carbon footprint, promoting sustainable technological solutions.</span></p><p id="h.d5pxnwp9zppr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Wireless Novel Routing Protocol, MDPC, Chunking methods, Data De-duplication.</span></p><p id="h.tjofvptvedvf" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Internet of Things Network Architecture and Security Challenges</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Muhammad R Ahmed</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Ahmed Al Shihimi</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Thirein Myo1 Badar Al Baroomi</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and M Shamim Kaiser</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Military Technological College, Muscat, Oman, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Institute of Information Technology , Jahangirnagar Universiry, Savar, Bangladesh</span></p><p id="h.3mureo498vk3" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The Internet of Things (IoT) has transformed not only the way we communicate and operate our devices, but it has also brought us significant security challenges. A typical IoT network architecture consists of four levels: a device, a network, an application, and a service, each with its own security considerations. There are three types of IoT networks: Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs). Each type has its own security requirements, so it is important to understand their particular security requirements. Several communication protocols that are used in IoT networks, like Wi-Fi and Bluetooth, are also susceptible to vulnerabilities that require the implementation of additional security measures. In addition to physical security challenges, there are numerous security challenges in the form of authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security. In order to deal with these challenges, we need to take a multi-layered approach that is comprised of physical, technical, and organizational measures. In this paper, we present an overview of IoT network architecture, along with an analysis of security challenges.</span></p><p id="h.jp6nkgydpoxh" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Internet of Things, Architecture, Challenges, Security.</span></p><p id="h.prdh96b369lf" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">An IoT- Based Smart City Model using Packet Tracer Simulator</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Shaikha Alhajri, Noura Aljulaidan, Zainab Alramdan, Relam Alkhaldi, Zomord Alshihab, Khaznah Alhajri, Huda Althumali, and Taghreed Balharith, Computer Science Department, College of Science and Humanities, Imam, Abdulrahman Bin Faisal University, P.O.Box 31961, Jubail, Saudi Arabia.</span></p><p id="h.iuixignjwrcj" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The Internet of Things (IoT) is one of the technology trends nowadays. In addition, the IoT is one means of developing a living life. This paper presents a smart city model based on the IoT using Cisco Packet Tracer simulation software. As a starting point, the paper explains smart city architecture that aims to improve life through three aspects. The first aspect is creating a network that allows users to control their smart devices from anywhere and at any time. The second aspect is bypassing the high budget by improving operational efficiency through the managed interconnection between smart devices within the city. Ultimately, the third aspect is increasing security in all city facilities. The simulation showed that the smart city would make life in cities more productive and interactive.</span></p><p id="h.xnatmtw9yvts" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">IoT, Smart City, Cisco, Packet Tracer, Networks</span></p><p id="h.3h2vkqaawasv" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Extending Common Usability Heuristics List With Learner-centric Strategies for an Exhaustive Elearning Design Assessment</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Nadia MENAD, Department of Computer Science, University of Science and Technology, Oran, Algeria</span></p><p id="h.i4ohhkvbnq3" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The learner-centered approach to e-Learning is an emerging philosophy that has been winning prominence in the educational space in nowadays. This approach emphasizes creating a more engaging e-Learning environments by putting the needs of the learner first and creating an adapted situation where the learner can succeed. In this article we will explore what this new way of thinking looks like in practice, and how this later could be applicable in interface design. According to several research studies, a learner-centric approach to education is far more beneficial than any other method. Such an instructional method encourages learners to adopt a “I can do” mindset. Learners are allowed to learn autonomously, in a positive manner, and be extremely motivated. Psychological researchers believe that motivation is tied to autonomy and the manner of designing interfaces have a direct impact on the learner. For this purpose, elearning application designers should adapt this way of thinking as a part of their conception. Our contribution aims to extend an existing usability evaluation nterface heuristics, these common list has been enriched in our proposal with a learner centric strategies, to give a birth of an exhaustive e-learning interface design assessment questionnaire.</span></p><p id="h.ezb83ax59evp" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">User experience, Educational platforms, interface evaluation, Online educational environment, Learnercentric strategies, Remote Teaching quality.</span></p><p id="h.ksmpmxuhaxmf" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Queued Combined Guard Channel and Mobile Assisted Handoff Call Admission in 5g Networks</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Nagla O. Mohamed, Computer Science and Engineering Department, Yanbu Industrial College, KSA.</span></p><p id="h.kzwrk0nj0zr1" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The combined guard channels and mobile assisted with handoff queueing call admission control is studied. Two customer types, narrowband (voice calls) and wideband (data, video and media) are considered. Matrix algorithmic techniques are used to solve the balance equations to calculate the different performance measures of the system. The results indicate that when handoff call are queued, handoff call dropping is reduced for both types of calls and there is an increase in the bandwidth utilization. There is no noticeable change in the blocking probability of new calls. Increasing the size of the queue, led to further reduction in the handoff call dropping and increase in the bandwidth utilization.</span></p><p id="h.6k3bd4536ri3" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Call admission control, handoff, guard channels, mobile assisted handoff.</span></p><p id="h.d2wgekwip6dl" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Mobile Application to Enable Donation of Devices Within a Community With the Potential Social and Environmental Impact</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Shengyu Zhang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Jonathan Sahagun</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Rancho Cucamonga High School, 11801 Lark Dr, Rancho Cucamonga, CA 91701, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768.</span></p><p id="h.ckf16fdyg4xr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The project aims to develop a mobile application to increase device donation within a community and evaluate its ef ectiveness in increasing donation and user satisfaction [1]. The background of the problem is presented along with the hypothesis that the mobile application will increase donation by making it more convenient and increasing awareness of the need for donation [2]. The proposed solution involves conducting two studies: one to measure the number of devices donated by participants who have access to the mobile application and one to measure the satisfaction level of users who donate via the mobile application compared to traditional methods. The key technologies and components of the program are outlined, including a user-friendly interface and features such as device compatibility and donation tracking. Challenges encountered during development are discussed, including issues with testing and user feedback. The application is tested in various scenarios to ensure functionality and usability. The results show an increase in the number of devices donated and higher satisfaction levels among users who donate via the mobile application [3]. The projects importance is highlighted by the potential to make a positive impact on the community and improve access to technology for those in need.</span></p><p id="h.mbrayk4j3h1b" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Digital divide, Device donation, E-waste reduction, Community engagement.</span></p><p id="h.ac85ub32ofa8" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Comparative Study of Denoising Techniques for Improving 5g Communication at 3.5ghz. Simulation Approach</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Seyi E. Olukanni,Department of Physics, Confluence University of Science and Technology, Nigeria</span></p><p id="h.c4pzki5lvsl0" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">This paper presents a comparative study of denoising techniques for improving 5G communication at 3.5GHz. A 5G communication system comprising a transmitter, a channel, and a receiver is simulated with MatLab and three types of noise (thermal noise, intermodulation noise, and external interference) are introduced to the generated signal. The wavelet, PCA, weiner, median filter, and the karmer filter are used to denoised the signal with only thermal noise and also denoise the signal with all the noise present.Their perfomances are measured using signal-to-noise ratio (SNR), mean square error (MSE), and peak signalto-noise ratio (PSNR).The results show that karmer filter outperforms the other techniques in terms of MSE, SNR and PSNR.These findings can be valuable for researchers and practitioners in the field of 5G communication system design and implementation, as they provide insights into the most effective denoising techniques for improving 5G communication performance.</span></p><p id="h.km8pte46oce4" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">5G, communication, Denoising, Wavelet, Wiener Filtering, PCA, Median Filtering, Kalman Filtering.</span></p><p id="h.ezs6v3vhei6n" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Mobile Application to Evaluate the Relationship Between Countries or Areas Based on Twitter</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Zimo Jiang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Yang Liu</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Irvine High School, 4321 Walnut Ave, Irvine, CA 92604, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA91768</span></p><p id="h.xdw10npdqh6s" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">In recent years, there has been a noticeable deterioration in international relations between various countriesaround the world. This has led to an increase in misunderstandings, cultural clashes, and even conflicts between dif erent nations. Many people are feeling the ef ects of this breakdown in relations, especially those who are trying to navigate interactions with individuals from dif erent countries. To address this problem, an app, which aims to help people understand the relationship between dif erent countries, is designed. The app is called Country Relations and is designed to provide users with a comprehensive understanding of the financial and social relationship between dif erent countries. Country Relations uses an algorithm that automatically collects news keywords to analyze a large database of economic or social information from around the world. By entering two countries into the application, users can obtain an accurate assessment of the relationship between these two countries. It might be useful for those who are planning to travel or work abroad, as well as for individuals who are interested in learning more about dif erent cultures. In conclusion, the breakdown in international relations in recent years has created a need for new tools that can help people understand the relationship between dif erent countries. This app is designed to fill this gap, providing users with a comprehensive understanding of the financial and social relationship between dif erent nations.</span></p><p id="h.tg5byjc5atqs" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Country Relationship, Twitter, Thunkable, Mobile Application.</span></p><p id="h.y7wxt8wcmxyi" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">A Helpful Mobile Application to Assist the Behaviors of Autistic People Through Mini Games Created Using Unity</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Leon Huang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Moddwyn Andaya</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> ,</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Germantown Friends School, 31 W Coulter St, Philadelphia, PA 19144 ,</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA91768</span></p><p id="h.tfb8nmdjp2f3" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">With proliferating rates of people being diagnosed with autism, it has rung the bell for immediate change [7]. In an efort to ring the bell louder — though minimalistically — this app was developed to make life easier for autistic kids through the refining of their comprehension skills, decision-making skills, and restrictive behaviors [8]. This was done through the making of minigames and an adventure story. Some minigames were designed to cater to the restrictive behaviors of autistic kids by making the games more engaging. Other games focused on improving comprehension skills, such as memory or vocabulary. The adventure game tested both comprehension and decision- making skills. Despite the app s positive impact, there were blind spots due to the complex nature of autism. The best solution was to continuously tinker with the app to ensure maximum compatibility with the autistic audience. Although autism is a dif icult diagnosis to cure, such an app can assist in making the lives of autistic kids easier. With increasing rates of autism diagnosis, this app serves as a reminder of the need for more resources to cater to the growing population of autistic individuals [9].</span></p><p id="h.z6z1u9euar4i" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Autism, Behavior, Minigames, Development.</span></p><p id="h.fp3r27pynts4" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Shootpro: an Interactive and Immersive Basketball Shooting Practice Assistance System Using Artificial Intelligence and Computer Vision</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Yuetpang Chen</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Lin Yang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Marisabel Chang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1, 2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Thayer Academy, 745 Washington St, Braintree, MA 02184,213711 Somerset Ln SE, Bellevue WA 98006,</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.shzqzi6acgot" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Today, millions of people watch basketball like the NBA and many have a favorite player whom they admire [4]. Some even want to play the sport like their favorite star. However, for those who haven’t tried the sport before, basketball can be very difficult. For example, beginners can miss shots because their shooting form changes every time, but they don’t know that its changed, resulting in repeated misses as they don’t fix it. Also, some people don’t know what a “correct shot” looks like and therefore wouldn’t know how to improve their shots. This paper proposes a software to solve this problem. This software uses mediapipe poses, AI comparison, and cv2 to help users identify the problems above and fix them [5]. We applied our application to the real-world basketball court and conducted a qualitative evaluation of the approach. The results show that with the help of this application, basketball players shoot with a better accuracy and form.</span></p><p id="h.bn6d4atgpwnh" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Basketball, Corrector, Shooting Form.</span></p><p id="h.5tvoj8njzszj" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">How to Use Classical Operation in Digital Bits to Simulate Quantumbits for the Rsa Cryptosystem</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Jun-Ya Wang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Xui-Chengn Chang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Hung-Ju Wang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">National Taiwan University of Science and Technology, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">National Chengchi University, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Bureau of Standards, Metrology, and Inspection</span></p><p id="h.flux7u6yo8n6" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">In quantum algorithm, the Shors algorithm can find prime decomposition of very big numbers easily and break RSA encryption much faster and more efficiently than in the classical case. How to complicant the public key to slow down the speed and efficiency of Shors algorithm to secure our RSA encryption scheme is main issue in this study. By using classical random simulation to operation as quantum bits to complicate the RSA cryptosystem, even Shors algorithm can not to find prime decomposition of very big numbers n with qubits random simulation easily.</span></p><p id="h.rqanrwkqn6mi" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">encryption, decryption, key, quantum bits, simulation.</span></p><p id="h.vheqy1sy17kc" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Efficientfair and Robust Spdz-like Multi-party Computation</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Chung-Li Wang, Alibaba Inc., Hangzhou City, Zhejiang Province, China</span></p><p id="h.ubg71trgn4yr" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Effective multi-party computation protocols have been developed, but concerns regarding privacy and correctness persist. Classic results demonstrate that guaranteed output delivery can be achieved by assuming fairness and identifiable abort. However, it is still challenging to design an efficient implementation that can deliver correct outputs while maintaining robustness and fairness, if the majority is malicious. To address this issue, we have redesigned the secret-sharing mechanism and employed a semi-trusted third party (TTP) as the key manager to provide optimistic backup for output delivery. The verification and delivery procedures prevent the malicious parties from “stealing” the output, when there is at least one honest party. Furthermore, the TTP has no knowledge of output, so even if he is malicious and colluding, we only lose fairness. The decryption is needed only when misconduct is detected. Our scheme also enables identified abort for offline preprocessing, and the audit of the offline sub-protocols can be publicly performed, holding corrupted parties accountable before receiving private inputs. With fairness and identifiable abort, output delivery is guaranteed by excluding the cheaters.</span></p><p id="h.lfonvgl85bze" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Efficient Multi-Party Computation, Public Verifiability, Robustness, Fairness, Semi-Trusted Third Party.</span></p><p id="h.qb1xpj3p6h3n" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Performance Analysis Of AODV And DSR Routing Protocols Under Blackhole Attack Using Ns-2</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Ferdinand Alifo</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> Mustapha Awinsongya Yakubu</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Prof. Michael Asante</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">MIS/Computer Dep., Ministry of Local Government, Local Gov’t Service, Sekyere East District Assembly, Ghana, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">University of Cincinnati Ohio, USA, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Computer Science, Kwame Nkrumah University of Science and Technology, Ghana</span></p><p id="h.w22h3taxorks" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Mobile Ad-Hoc Networks (MANETs) are wireless networks without a fixed infrastructure, allowing nodes to move freely and act as both routers and hosts. Nodes establish virtual links and use routing protocols like AODV, DSR, and DSDV for connections. Security is a concern, with the Blackhole attack being a notable threat where a malicious node drops packets instead of forwarding them. The paper used NS-2.35 ns-allinone-2.35 version for simulating the impact of Blackhole nodes and implementing AODV and DSR protocols. The study analyzed average throughput, packet delivery ratio, and residual energy as metrics, observing that AODV showed better energy efficiency and delivery than DSR, but DSR performed better in throughput. Environmental factors and data sizes were also considered in the analysis.</span></p><p id="h.oft4xsol4w2o" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Performance Analysis, AODV, DSR, MANET, Protocols, Security, Blackhole, Metrics, Attack, NS2</span></p><p id="h.8s1m5jd1qktc" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">An Informational Hub That Utilizes Modern Application User Interfaces to Encourage Healthy Lifestyles</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Weibo Jin</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Megan Liu</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">University High School, 4771 Campus Drive, Irvine, CA 92612, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.rroicwexd1vz" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">The idea for this app is a platform for people and especially athletes to know proper dieting, exercising, and how to recover from workout-related accidents [2]. I had to go online and search up everything I needed to know and sometimes I would get false information from the wrong websites. Athletes should be able to see what is good for them to eat, what kinds of workouts they should do everyday, as well as how to recover from certain injuries that they may sustain. When the user logs in to the app they will see options that say recovery exercise news and nutrition pages that contain all the information they will need.The nutrition page will display some common good foods to eat and their data such as calories, carbs, and more. The exercises page will list several important exercises vital to a good workout. Lastly, the injury page, also referred to as the recovery page, will show users a picture of the human body and allow them to select certain parts of the body to read up on relevant information pertaining to injuries around that area [3]. I also made 2 experiments to help me know and fix the app’s blindspot, the first one is a survey i give to my friends to try my app and fill it out, the second one is i follow the workouts and foods on my app for one day and compare to american’s daily nutrition and workout plans.</span></p><p id="h.rqjgalgrro4m" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Fitness, Exercise, Database, Injuries.</span></p><p id="h.4da515lawq19" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">An Emotion Detection Mobile Application to Decrease Potential Mental Disorder Among Seniors Using Sentiment Analysis From Audio Data</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Tengjie Qiu</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Daniel Carter</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Mater Dei High School, 1202 W Edinger Ave, Santa Ana, CA 92707, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.a3i0ev7ej6j4" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">We wanted to create a better, more trustworthy solution for caretakers to determine the emotion and feelings their patients are experiencing. This is useful for caretakers to adjust how they go about caring for their patients.To solve this, we decided to create a mobile consumer application. Architecturally, the user (caretaker) will be using this mobile app as a front end which will record and send audio of the patient to a backend service. The service will be hosted on AWS and it will be a sentiment analysis algorithm written in Python. The service will analyze and determine the feeling of the patient and send it back to the front end for the caretaker to see. The front end was written in Flutter. To evaluate the effectiveness of the proposed mobile application, we conducted testing focused on two key aspects: accuracy and response speed. The accuracy of the sentiment analysis algorithm was assessed by comparing the analysis results of pre-recorded audio with predetermined feelings. This evaluation aimed to measure the algorithms ability to correctly identify and classify emotions. Additionally, we tested the speed of response by sending audio samples of varying lengths, ranging from 2 seconds to 60 seconds. The objective was to determine the optimal response time for providing feedback on the users mood. Our findings revealed that the algorithm demonstrated high accuracy in detecting emotions within the tested audio samples. Moreover, the ideal response time for generating feedback was identified as 5 seconds, striking a balance between promptness and accuracy. These testing results validate the efficacy of the proposed application in accurately analyzing sentiment and providing timely responses, supporting its potential as an effective tool for monitoring and addressing the mental well-being of elderly individuals. This proposed mobile app, utilizing sentiment analysis, offers a convenient and accurate means of monitoring and addressing the mental well-being of elderly individuals. Its potential to combat loneliness and provide timely support makes it a valuable tool for improving their overall quality of life.</span></p><p id="h.3pk3emskc89j" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Sentiment Analysis, Audio Data, Mobile Application, Mental Disorder.</span></p><p id="h.fznkl9v48bjc" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">An End-to-end Gsm/sms Encrypted Approach for Smartphone Employing Advanced Encryption Standard (Aes)</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Wasim Abbas</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Salaki Reynaldo Joshua</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Asim Abbas</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Je-Hoon Lee</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">4</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Seong Kun Kim</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">5</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1, 2, 4 </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Electronics, Information and Communication Engineering, Kangwon National University, Samcheok-si, Republic of Korea, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Division of Computer Science, Mathematics and Science, St. John’s University, Queens NY 11439, USA, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">5</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Department of Liberal Studies, Kangwon National University, Samcheok-si, Republic of Korea</span></p><p id="h.x2oi04utidwp" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Encryption is crucial for securing sensitive data during transmission over networks. Various encryption techniques exist, such as AES, DES, and RC4, with AES being the most renowned algorithm. We proposed methodology that enables users to encrypt text messages for secure transmission over cellular networks. This approach utilizes the AES algorithm following the proposed protocols for encryption and decryption, ensuring fast and reliable data protection. This approach ensures secure text encryption and enables users to enter messages that are encrypted using a key at the senders end and decrypted at the recipients end, which is compatible with any Android device. SMS are encrypted with the AES algorithm, making them resistant to brute-force attempts. As SMS has become a popular form of communication, protecting personal data, email alerts, banking details, and transactions information. It addresses security concerns by encrypting messages using AES and cryptographic techniques, providing an effective solution for protecting sensitive data during SMS exchanges.</span></p><p id="h.oepq6efq2lo9" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">AES, SMS, Android, Privacy, Encryption, Decryption, communication systems .</span></p><p id="h.3ca9i7kf9fcb" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Precision Pick-up of Micro Objects Using String-based Soft Robotic Grippers</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Byung Jun Kwon</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Gyu Tae Bae</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Byung Jun Kwon, Cornerstone Collegiate Academy of Seoul, Seoul, Republic of Korea, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Gyu Tae Bae, University of California, Berkeley, Berkeley, United States</span></p><p id="h.8s9zlcxcjxif" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">We introduce a novel string-based soft robotic gripper, capable of gentle and precise manipulation of delicate and small objects. The primary challenge lies in delicately handling objects of varying shapes and sizes without causing damage, a prevalent issue with traditional hard grippers. Our solution employs a string-based design, where the strings envelop the object, providing secure and damage-free grip. A motor torque sensor is utilized to optimally control the gripping pressure, preventing over-gripping and ensuring object integrity. We have successfully tested our soft gripper on delicate items ranging from grains of rice to strawberries. This innovative approach presents a solution to two pressing problems: the labor-intensive and potentially damaging manual picking of delicate items, and the inability of conventional robotic grippers to handle small and delicate objects effectively. Furthermore, the versatility and delicate handling of our soft gripper opens up potential applications in various fields such as agriculture, healthcare, and manufacturing. The design and performance of the soft gripper, its advantages over traditional grippers, and its potential applications are explored in this paper. We demonstrate the efficacy of our design through experimental results, confirming the robustness and adaptability of the string-based soft gripper.</span></p><p id="h.vjhz79109qnc" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Soft robotics,Gripping technology,Manipulation techniques,Object handling Material science,Robotics engineering,Precision control,Damage prevention, Object integrity preservation.</span></p><p id="h.v6rg4dp6or5b" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">An Intelligent Mobile Application to Help Students with Problems Between their Peers using Machine Learning</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Audrey Chen</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Victor Phan</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">West Windsor-Plainsboro High School North, 90 Grovers Mill Rd, Plainsboro Township, NJ 08536, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.e6ywkqbeujen" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Tutoring is not a commonly available service for middle and high school students who often have to learn the toughest subjects in the K-12 education system [1][2]. This can negatively impact their learning and cause losses in opportunities that could have been avoided. In response, we suggest a mobile application that is able to assist students in their learning as well as help them educate others so that all students can learn together [3]. This application uses the Flutter framework as well as Google’s Firebase service to store user-generated data [4]. An AI recommender system as well as a subject assignment system is hosted on a Python Flask backend server [5]. It will determine what questions someone should look at, as well as what kind of subject a question seems to be, respectively. These systems rely on an AI that uses natural language processing. To test the effectiveness of our application, we devise two experiments. In the first experiment, we determine the accuracy of our subject assigner by giving it several mock questions. In our second experiment, we compare and contrast different recommender systems. Ultimately, our subject assigner is at 50% accuracy and the recommenders we used were roughly the same in accuracy. Overall, this application is polished and with some more improvements to the backend and AI integration, it will be a useful tool for students who need an extra boost in school.</span></p><p id="h.f79la859b1np" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Education, Database, Natural Language Processing, Machine Learning</span></p><p id="h.v1vcge86aruo" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">An Intelligent System to Assist Students in Engagement with their Studying using Generative Artificial Intelligence Models</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Haozhe Yu</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, Lin Yang</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> and Tami Takada</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">1</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Pacific Academy, 4947 Alton Pkwy, Irvine, CA 92604, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">2</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">13711 Somerset Ln SE, Bellevue, WA 98006, </span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 7.199999999999998pt; font-weight: 400; vertical-align: super;">3</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Computer Science Department, California State Polytechnic University, Pomona, CA 91768</span></p><p id="h.wwt6j5k1k2yt" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Oftentimes students in the high school system tend to have the least amount of studying assistance despite being in the most rigorous curriculums that the K-12 education system has to offer. Students need someone to guide them on how to complete their homework. TeachNow is a proposed application that would help these students by allowing them to post to a global message board and help out each other. The app centrally relies on a ChatGPT API, to be used by students when no one has responded to their question yet [1]. It works by converting the user’s question into a prompt and then sending it over to the ChatGPT API for processing [2]. Students are able to get these responses from ChatGPT as soon as their question is posed. To test the effectiveness of this system, we perform a test of the ChatGPT API by asking it several mock questions, to which the results were generally desirable [3]. With further revisions, this application would be a perfect fit for students struggling with their education.</span></p><p id="h.51cm4g7h30zn" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">ChatGPT, Tutoring, Education, Database, Artificial Intelligence</span></p><p id="h.97fjey93wqyd" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Utilisation of Open Intent Recognition Models for Customer Support Intent Detection</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Dr.Rasheed Mohammad, Oliver Favell, Shariq Shah, Emmett Cooper, Edlira, School of computing and digital technology, Birmingham City University, United Kingdom</span></p><p id="h.hsl6myxnnywn" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Businesses have sought out new solutions to provide support and improve customer satisfaction as more products and services have become interconnected digitally. There is an inherent need for businesses to provide or outsource fast, efficient and knowledgeable support toremain competitive. Support solutions are also advancing with technologies, including use of social media, Artificial Intelligence (AI), Machine Learning (ML) and remote device connectivity to better support customers. Customer support operators are trained to utilise these technologies to provide better customer outreach and support for clients in remote areas. Interconnectivity of products and support systems provide businesses with potential international clients to expand their product market and business scale. This paper reports the possible AI applications in customer support, done in collaboration with the Knowledge Transfer Partnership (KTP) program between Birmingham City University and a company that handles customer service systems for businesses outsourcing customer support across a wide variety of business sectors. This study explored several approaches to accurately predict customers&#39; intent using both labelled and unlabelled textual data. While some approaches showed promise in specific datasets, the search for a single, universally applicable approach continues. The development of separate pipelines for intent detection and discovery has led to improved accuracy rates in detecting known intents, while further work is required to improve the accuracy of intent discovery for unknown intents.</span></p><p id="h.26y8842zr06k" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 10.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 14.0pt; margin-top: 14.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: justify;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">Intent Recognition, Customer Support, Intent Detection</span></p></div></div></div></div></div></div></div></div></div></section><section id="h.32a03f15c00ef3ad_467" class="yaqOZd"><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.32a03f15c00ef3ad_464" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p id="h.mu518wheovzs" dir="ltr" class="zfr3Q CDt4Ke " style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2.0pt; margin-top: 11.0pt; padding-bottom: 0.0pt; padding-left: 0.0pt; padding-right: 0.0pt; padding-top: 0.0pt; text-align: left;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 13.999999999999998pt; font-weight: 400; vertical-align: baseline;">Contact Us</span></p><p dir="ltr" class="zfr3Q CDt4Ke " style="line-height: 1.2;"><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> </span><span class="C9DxTc " style="color: #0000ff; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;">nc.conf@yahoo.com</span><span class="C9DxTc " style="color: #000000; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 400; vertical-align: baseline;"> </span></p></div></div></div></div></div></div></div></div></div></section></div><div class="Xpil1b xgQ6eb"></div><footer jsname="yePe5c"><section id="h.32a03f15c00ef3ad_378" class="yaqOZd lQAHbd"><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.32a03f15c00ef3ad_375" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><small id="h.on5c0eetrgr" dir="ltr" class="zfr3Q TMjjoe CDt4Ke " style="display: block; text-align: center;"><span class="C9DxTc " style="color: #ffffff; font-family: &#39;Times New Roman&#39;, Arial; font-size: 12.0pt; font-weight: 700; vertical-align: baseline;">Copyright © NC 2023 </span></small></div></div></div></div></div></div></div></div></div></section></footer><div jscontroller="j1RDQb" jsaction="rcuQ6b:rcuQ6b;MxH79b:JdcaS;FaOgy:XuHpsb;" class="dZA9kd ynRLnc" data-last-updated-at-time="1693027939612" data-is-preview="false"><div role="button" class="U26fgb JRtysb WzwrXb I12f0b K2mXPb zXBiaf ynRLnc" jscontroller="iSvg6e" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;;keydown:I481le;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="0" aria-haspopup="true" aria-expanded="false" data-menu-corner="bottom-start" data-anchor-corner="top-start"><div class="NWlf3e MbhUzd" jsname="ksKsZd"></div><span jsslot class="MhXXcc oJeWuf"><span class="Lw7GHd snByac"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span><div jsname="xl07Ob" style="display:none" aria-hidden="true"><div class="JPdR6b hVNH5c" jscontroller="uY3Nvd" jsaction="IpSVtb:TvD9Pc;fEN2Ze:xzS4ub;frq95c:LNeFm;cFpp9e:J9oOtd; click:H8nU8b; mouseup:H8nU8b; keydown:I481le; keypress:Kr2w4b; blur:O22p3e; focus:H8nU8b" role="menu" tabindex="0" style="position:fixed"><div class="XvhY1d" jsaction="mousedown:p8EH2c; touchstart:p8EH2c;"><div class="JAPqpe K0NPx"><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Google Sites" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:Toy3n;" jsname="V2zOu"><div class="jO7h3c">Google Sites</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" data-disabled-tooltip="Report abuse is not available in preview mode" aria-label="Report abuse" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jscontroller="HYv29e" jsaction="JIbuQc:dQ6O0c;" jsname="lV5oke" data-abuse-proto="%.@.null,null,&quot;https://sites.google.com/view/nc-2023/accepted-papers&quot;]" data-abuse-reporting-widget-proto="%.@.null,&quot;https://sites.google.com/view/nc-2023/accepted-papers&quot;]"><div class="jO7h3c">Report abuse</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Page details" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:hriXLd;" jsname="Rg8K2c"><div class="jO7h3c">Page details</div></div></span></div></div></div></div></div></div><div jscontroller="j1RDQb" jsaction="focusin:gBxDVb(srlkmf); focusout:zvXhGb(srlkmf); click:ro2KTd(psdQ5e);JIbuQc:DSypkd(Bg3gkf);MxH79b:JdcaS;rcuQ6b:rcuQ6b;" class="LqzjUe ynRLnc" data-last-updated-at-time="1693027939612" data-is-preview="false"><div jsname="psdQ5e" class="Q0cSn"></div><div jsname="bN97Pc" class="hBW7Hb"><div role="button" class="U26fgb mUbCce fKz7Od kpPxtd QMuaBc M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="-1" aria-hidden="true"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span></div><div jsname="srlkmf" class="hUphyc"><div class="YkaBSd"><div class="iBkmkf"><span>Page updated</span> <span jsname="CFIm1b" class="dji00c" jsaction="AHmuwe:eGiyHb; mouseover:eGiyHb;" tabindex="0" role="contentinfo"></span></div></div><div class="YkaBSd" jsaction="click:Toy3n;"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow jsname="V2zOu" aria-disabled="false" tabindex="0">Google Sites</div></div><div class="YkaBSd" jscontroller="HYv29e" jsaction="click:dQ6O0c;" data-abuse-proto="%.@.null,null,&quot;https://sites.google.com/view/nc-2023/accepted-papers&quot;]" data-abuse-reporting-widget-proto="%.@.null,&quot;https://sites.google.com/view/nc-2023/accepted-papers&quot;]"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow aria-label="Report abuse" aria-disabled="false" tabindex="0">Report abuse</div></div></div></div></div></div></div></div><script nonce="gV9DOK5VfxTFbYhYpC1lDg">DOCS_timing['cov']=new Date().getTime();</script><script src="https://www.gstatic.com/_/atari/_/js/k=atari.vw.en_US.fw_mAcuwUyE.O/am=MBiA/d=1/rs=AGEqA5lwNXFYaHUUDGYHiMqlOO36DqQAOw/m=view" id="base-js" nonce="gV9DOK5VfxTFbYhYpC1lDg"></script></div></div><div jscontroller="YV8yqd" jsaction="rcuQ6b:npT2md"></div></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10