CINXE.COM

Accepted Papers

<!DOCTYPE html><html lang="en-US" itemscope itemtype="http://schema.org/WebPage"><head><meta charset="utf-8"><script nonce="gYY9hjrpGoa2x03ppj4ihw">var DOCS_timing={}; DOCS_timing['sl']=new Date().getTime();</script><script nonce="gYY9hjrpGoa2x03ppj4ihw">function _DumpException(e) {throw e;}</script><script data-id="_gd" nonce="gYY9hjrpGoa2x03ppj4ihw">window.WIZ_global_data = {"K1cgmc":"%.@.[null,null,null,[null,1,[1732693087,467145000]]]]","nQyAE":{}};</script><script nonce="gYY9hjrpGoa2x03ppj4ihw">_docs_flag_initialData={"atari-emtpr":false,"atari-eibrm":false,"docs-text-elei":false,"docs-text-usc":true,"atari-bae":false,"docs-text-emtps":true,"docs-text-etsrdpn":false,"docs-text-etsrds":false,"docs-text-endes":false,"docs-text-escpv":true,"docs-text-ecfs":false,"docs-text-ecis":true,"docs-text-eectfs":true,"docs-text-edctzs":true,"docs-text-eetxpc":false,"docs-text-eetxp":false,"docs-text-ertkmcp":true,"docs-text-ettctvs":false,"docs-text-ettts":true,"docs-text-escoubs":false,"docs-text-escivs":false,"docs-text-escitrbs":false,"docs-text-ecgvd":false,"docs-text-esbbcts":true,"docs-text-etccdts":false,"docs-text-etcchrs":false,"docs-text-etctrs":false,"docs-text-eltbbs":true,"docs-text-ecvdis":false,"docs-text-elaiabbs":false,"docs-text-eiosmc":false,"docs-text-ecslpo":false,"docs-text-etb":false,"docs-text-esbefr":false,"docs-text-ipi":false,"docs-etshc":false,"docs-text-tbcb":2.0E7,"docs-efsmsdl":false,"docs-text-etof":false,"docs-text-ehlb":false,"docs-text-epa":true,"docs-text-dwit":false,"docs-text-elawp":false,"docs-eec":false,"docs-ecot":"","docs-text-enbcr":false,"docs-sup":"","umss":false,"docs-eldi":false,"docs-dli":false,"docs-liap":"/logImpressions","ilcm":{"eui":"AHKXmL1yqyJUuC3wT2e0pQAVHJk41D3BPrf3tkBUam5j0tOk8xPyjVEYXngendnYf0_cdt1hWiFb","je":1,"sstu":1732700944594419,"si":"CPTrt4Ke_IkDFa28IwAdbYsJZQ","gsc":null,"ei":[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747263,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50561333,50561341,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71652840,71652848,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94353368,94353376,94390153,94390161,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444292,94444300,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086181,95086189,95087186,95087194,95087217,95087225,95111985,95111993,95112873,95112881,95118561,95118569,95135933,95135941,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95270945,95270953,95314802,95314810,95317985,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99452336,99452344,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101606928,101606936,101617516,101617524,101631040,101631048,101705089,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101875074,101875082,102047752,102047760],"crc":0,"cvi":[]},"docs-ccdil":false,"docs-eil":true,"info_params":{},"buildLabel":"editors.sites-viewer-frontend_20241112.02_p1","docs-show_debug_info":false,"atari-jefp":"/_/view/jserror","docs-jern":"view","atari-rhpp":"/_/view","docs-ecuach":false,"docs-cclt":2033,"docs-ecci":true,"docs-esi":false,"docs-efypr":true,"docs-eyprp":true}; _docs_flag_cek= null ; if (window['DOCS_timing']) {DOCS_timing['ifdld']=new Date().getTime();}</script><meta name="viewport" content="width=device-width, initial-scale=1"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="referrer" content="origin"><link rel="icon" href="https://lh3.googleusercontent.com/9swFbwZJk7ozU4Fd_wyRmQhZdxRlWN0-G3YWlJFLzU4HnRK2ZFVGFQqSKsvfxXiIGG_eeLO8Irn3ttqRXE1znLQBD_qYyj3WpHNp40CnNvE5DsCr"><meta property="og:title" content="Accepted Papers"><meta property="og:type" content="website"><meta property="og:url" content="https://sites.google.com/view/spm-2022/accepted-papers"><meta property="og:description" content=" Accepted Papers"><meta itemprop="name" content="Accepted Papers"><meta itemprop="description" content=" Accepted Papers"><meta itemprop="url" content="https://sites.google.com/view/spm-2022/accepted-papers"><meta itemprop="thumbnailUrl" content="https://lh5.googleusercontent.com/8L7fyLjBQuz8cVaXbVuAYnP4jqrLismjnvndOJF-el8KW2sa7JD3qdHe21VP7HeWsc97ggQcngQ6BJ3Qkcb3XrQ=w16383"><meta itemprop="image" content="https://lh5.googleusercontent.com/8L7fyLjBQuz8cVaXbVuAYnP4jqrLismjnvndOJF-el8KW2sa7JD3qdHe21VP7HeWsc97ggQcngQ6BJ3Qkcb3XrQ=w16383"><meta itemprop="imageUrl" content="https://lh5.googleusercontent.com/8L7fyLjBQuz8cVaXbVuAYnP4jqrLismjnvndOJF-el8KW2sa7JD3qdHe21VP7HeWsc97ggQcngQ6BJ3Qkcb3XrQ=w16383"><meta property="og:image" content="https://lh5.googleusercontent.com/8L7fyLjBQuz8cVaXbVuAYnP4jqrLismjnvndOJF-el8KW2sa7JD3qdHe21VP7HeWsc97ggQcngQ6BJ3Qkcb3XrQ=w16383"><link href="https://fonts.googleapis.com/css?family=Lato%3A300%2C300italic%2C400%2C400italic%2C700%2C700italic&display=swap" rel="stylesheet" nonce="IzH6jV90a7AkC6G862_Z6g"><link href="https://fonts.googleapis.com/css?family=Google+Sans:400,500|Roboto:300,400,500,700|Source+Code+Pro:400,700&display=swap" rel="stylesheet" nonce="IzH6jV90a7AkC6G862_Z6g"><style nonce="IzH6jV90a7AkC6G862_Z6g">@media only screen and (max-width: 479px){.jgG6ef{font-size: 17.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.jgG6ef{font-size: 17.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.jgG6ef{font-size: 18.0pt;}}@media only screen and (min-width: 1280px){.jgG6ef{font-size: 18.0pt;}}</style><link rel="stylesheet" href="https://www.gstatic.com/_/atari/_/ss/k=atari.vw.7R57rYYVGiA.L.X.O/am=MBiA/d=1/rs=AGEqA5nH97dOwqY0iGblvGlWiaR59owncA" data-id="_cl" nonce="IzH6jV90a7AkC6G862_Z6g"><script nonce="gYY9hjrpGoa2x03ppj4ihw"></script><title>Accepted Papers</title><style jsname="ptDGoc" nonce="IzH6jV90a7AkC6G862_Z6g">.M63kCb{background-color: rgba(255,255,255,1);}.OUGEr{color: rgba(33,33,33,1);}.duRjpb .OUGEr{color: rgba(34,110,147,1);}.JYVBee .OUGEr{color: rgba(34,110,147,1);}.OmQG5e .OUGEr{color: rgba(33,33,33,1);}.iwQgFb{background-color: rgba(0,0,0,0.150000006);}.ySLm4c{font-family: Lato, sans-serif;}.CbiMKe{background-color: rgba(30,108,147,1);}.qeLZfd .zfr3Q{color: rgba(33,33,33,1);}.qeLZfd .qnVSj{color: rgba(33,33,33,1);}.qeLZfd .Glwbz{color: rgba(33,33,33,1);}.qeLZfd .duRjpb{color: rgba(34,110,147,1);}.qeLZfd .qLrapd{color: rgba(34,110,147,1);}.qeLZfd .JYVBee{color: rgba(34,110,147,1);}.qeLZfd .aHM7ed{color: rgba(34,110,147,1);}.qeLZfd .OmQG5e{color: rgba(33,33,33,1);}.qeLZfd .NHD4Gf{color: rgba(33,33,33,1);}.qeLZfd .aw5Odc{color: rgba(0,101,128,1);}.qeLZfd .dhtgD:hover{color: rgba(0,0,0,1);}.qeLZfd .dhtgD:visited{color: rgba(0,101,128,1);}.qeLZfd .iwQgFb{background-color: rgba(0,0,0,0.150000006);}.qeLZfd .OUGEr{color: rgba(33,33,33,1);}.qeLZfd .duRjpb .OUGEr{color: rgba(34,110,147,1);}.qeLZfd .JYVBee .OUGEr{color: rgba(34,110,147,1);}.qeLZfd .OmQG5e .OUGEr{color: rgba(33,33,33,1);}.qeLZfd:before{background-color: rgba(242,242,242,1); display: block;}.lQAHbd .zfr3Q{color: rgba(255,255,255,1);}.lQAHbd .qnVSj{color: rgba(255,255,255,1);}.lQAHbd .Glwbz{color: rgba(255,255,255,1);}.lQAHbd .duRjpb{color: rgba(255,255,255,1);}.lQAHbd .qLrapd{color: rgba(255,255,255,1);}.lQAHbd .JYVBee{color: rgba(255,255,255,1);}.lQAHbd .aHM7ed{color: rgba(255,255,255,1);}.lQAHbd .OmQG5e{color: rgba(255,255,255,1);}.lQAHbd .NHD4Gf{color: rgba(255,255,255,1);}.lQAHbd .aw5Odc{color: rgba(255,255,255,1);}.lQAHbd .dhtgD:hover{color: rgba(255,255,255,1);}.lQAHbd .dhtgD:visited{color: rgba(255,255,255,1);}.lQAHbd .iwQgFb{background-color: rgba(255,255,255,0.150000006);}.lQAHbd .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .duRjpb .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .JYVBee .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .OmQG5e .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .CbiMKe{background-color: rgba(255,255,255,1);}.lQAHbd:before{background-color: rgba(30,108,147,1); display: block;}.cJgDec .zfr3Q{color: rgba(255,255,255,1);}.cJgDec .zfr3Q .OUGEr{color: rgba(255,255,255,1);}.cJgDec .qnVSj{color: rgba(255,255,255,1);}.cJgDec .Glwbz{color: rgba(255,255,255,1);}.cJgDec .qLrapd{color: rgba(255,255,255,1);}.cJgDec .aHM7ed{color: rgba(255,255,255,1);}.cJgDec .NHD4Gf{color: rgba(255,255,255,1);}.cJgDec .IFuOkc:before{background-color: rgba(33,33,33,1); opacity: 0; display: block;}.O13XJf{height: 340px; padding-bottom: 60px; padding-top: 60px;}.O13XJf .IFuOkc{background-color: rgba(34,110,147,1); background-image: url(https://ssl.gstatic.com/atari/images/simple-header-blended-small.png);}.O13XJf .IFuOkc:before{background-color: rgba(33,33,33,1); opacity: 0.4; display: block;}.O13XJf .zfr3Q{color: rgba(255,255,255,1);}.O13XJf .qnVSj{color: rgba(255,255,255,1);}.O13XJf .Glwbz{color: rgba(255,255,255,1);}.O13XJf .duRjpb{color: rgba(255,255,255,1);}.O13XJf .qLrapd{color: rgba(255,255,255,1);}.O13XJf .JYVBee{color: rgba(255,255,255,1);}.O13XJf .aHM7ed{color: rgba(255,255,255,1);}.O13XJf .OmQG5e{color: rgba(255,255,255,1);}.O13XJf .NHD4Gf{color: rgba(255,255,255,1);}.tpmmCb .zfr3Q{color: rgba(33,33,33,1);}.tpmmCb .zfr3Q .OUGEr{color: rgba(33,33,33,1);}.tpmmCb .qnVSj{color: rgba(33,33,33,1);}.tpmmCb .Glwbz{color: rgba(33,33,33,1);}.tpmmCb .qLrapd{color: rgba(33,33,33,1);}.tpmmCb .aHM7ed{color: rgba(33,33,33,1);}.tpmmCb .NHD4Gf{color: rgba(33,33,33,1);}.tpmmCb .IFuOkc:before{background-color: rgba(255,255,255,1); display: block;}.tpmmCb .Wew9ke{fill: rgba(33,33,33,1);}.aw5Odc{color: rgba(0,101,128,1);}.dhtgD:hover{color: rgba(0,122,147,1);}.dhtgD:active{color: rgba(0,122,147,1);}.dhtgD:visited{color: rgba(0,101,128,1);}.Zjiec{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 19pt; font-weight: 300; letter-spacing: 1px; line-height: 1.3; padding-bottom: 62.5px; padding-left: 48px; padding-right: 36px; padding-top: 11.5px;}.XMyrgf{margin-top: 0px; margin-left: 48px; margin-bottom: 24px; margin-right: 24px;}.TlfmSc{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 15pt; font-weight: 300; line-height: 1.333;}.Mz8gvb{color: rgba(255,255,255,1);}.zDUgLc{background-color: rgba(33,33,33,1);}.QTKDff.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.YTv4We{color: rgba(178,178,178,1);}.YTv4We:hover:before{background-color: rgba(255,255,255,0.1199999973); display: block;}.YTv4We.chg4Jd:focus:before{border-color: rgba(255,255,255,0.3600000143); display: block;}.eWDljc{background-color: rgba(33,33,33,1);}.eWDljc .hDrhEe{padding-left: 8px;}.ZXW7w{color: rgba(255,255,255,1); opacity: 0.26;}.PsKE7e{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 12pt; font-weight: 300;}.lhZOrc{color: rgba(73,170,212,1);}.hDrhEe:hover{color: rgba(73,170,212,1);}.M9vuGd{color: rgba(73,170,212,1); font-weight: 400;}.jgXgSe:hover{color: rgba(73,170,212,1);}.j10yRb:hover{color: rgba(0,188,212,1);}.j10yRb.chg4Jd:focus:before{border-color: rgba(255,255,255,0.3600000143); display: block;}.tCHXDc{color: rgba(255,255,255,1);}.iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.wgxiMe{background-color: rgba(33,33,33,1);}.fOU46b .TlfmSc{color: rgba(255,255,255,1);}.fOU46b .KJll8d{background-color: rgba(255,255,255,1);}.fOU46b .Mz8gvb{color: rgba(255,255,255,1);}.fOU46b .Mz8gvb.chg4Jd:focus:before{border-color: rgba(255,255,255,1); display: block;}.fOU46b .qV4dIc{color: rgba(255,255,255,0.8700000048);}.fOU46b .jgXgSe:hover{color: rgba(255,255,255,1);}.fOU46b .M9vuGd{color: rgba(255,255,255,1);}.fOU46b .tCHXDc{color: rgba(255,255,255,0.8700000048);}.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.fOU46b .G8QRnc .Mz8gvb{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .Mz8gvb.chg4Jd:focus:before{border-color: rgba(0,0,0,0.8000000119); display: block;}.fOU46b .G8QRnc .ZXW7w{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .TlfmSc{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .KJll8d{background-color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .qV4dIc{color: rgba(0,0,0,0.6399999857);}.fOU46b .G8QRnc .jgXgSe:hover{color: rgba(0,0,0,0.8199999928);}.fOU46b .G8QRnc .M9vuGd{color: rgba(0,0,0,0.8199999928);}.fOU46b .G8QRnc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .G8QRnc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .usN8rf .Mz8gvb{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .Mz8gvb.chg4Jd:focus:before{border-color: rgba(0,0,0,0.8000000119); display: block;}.fOU46b .usN8rf .ZXW7w{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .TlfmSc{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .KJll8d{background-color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .qV4dIc{color: rgba(0,0,0,0.6399999857);}.fOU46b .usN8rf .jgXgSe:hover{color: rgba(0,0,0,0.8199999928);}.fOU46b .usN8rf .M9vuGd{color: rgba(0,0,0,0.8199999928);}.fOU46b .usN8rf .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .usN8rf .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .aCIEDd .qV4dIc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .TlfmSc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .KJll8d{background-color: rgba(33,33,33,1);}.fOU46b .aCIEDd .ZXW7w{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .jgXgSe:hover{color: rgba(33,33,33,1); opacity: 0.82;}.fOU46b .aCIEDd .Mz8gvb{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .tCHXDc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}.fOU46b .a3ETed .qV4dIc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .TlfmSc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .KJll8d{background-color: rgba(255,255,255,1);}.fOU46b .a3ETed .ZXW7w{color: rgba(255,255,255,1);}.fOU46b .a3ETed .jgXgSe:hover{color: rgba(255,255,255,1); opacity: 0.82;}.fOU46b .a3ETed .Mz8gvb{color: rgba(255,255,255,1);}.fOU46b .a3ETed .tCHXDc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.XeSM4.b2Iqye.fOU46b .LBrwzc .tCHXDc{color: rgba(255,255,255,0.8700000048);}}.XeSM4.b2Iqye.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.KuNac.b2Iqye.fOU46b .tCHXDc{color: rgba(0,0,0,0.6399999857);}}.KuNac.b2Iqye.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .zDUgLc{opacity: 0;}.LBrwzc .ZXW7w{color: rgba(0,0,0,1);}.LBrwzc .KJll8d{background-color: rgba(0,0,0,1);}.GBy4H .ZXW7w{color: rgba(255,255,255,1);}.GBy4H .KJll8d{background-color: rgba(255,255,255,1);}.eBSUbc{background-color: rgba(33,33,33,1); color: rgba(0,188,212,0.6999999881);}.BFDQOb:hover{color: rgba(73,170,212,1);}.ImnMyf{background-color: rgba(255,255,255,1); color: rgba(33,33,33,1);}.Vs12Bd{background-color: rgba(242,242,242,1); color: rgba(33,33,33,1);}.S5d9Rd{background-color: rgba(30,108,147,1); color: rgba(255,255,255,1);}.zfr3Q{color: rgba(33,33,33,1); font-family: Lato, sans-serif; font-size: 11pt; font-weight: 400; line-height: 1.6667; margin-top: 12px;}.qnVSj{color: rgba(33,33,33,1);}.Glwbz{color: rgba(33,33,33,1);}.duRjpb{color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 34pt; font-weight: 300; letter-spacing: 0.5px; line-height: 1.2; margin-top: 30px;}.Ap4VC{margin-bottom: -30px;}.qLrapd{color: rgba(34,110,147,1);}.JYVBee{color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 19pt; font-weight: 400; line-height: 1.4; margin-top: 20px;}.CobnVe{margin-bottom: -20px;}.aHM7ed{color: rgba(34,110,147,1);}.OmQG5e{color: rgba(33,33,33,1); font-family: Lato, sans-serif; font-size: 15pt; font-style: normal; font-weight: 400; line-height: 1.25; margin-top: 16px;}.GV3q8e{margin-bottom: -16px;}.NHD4Gf{color: rgba(33,33,33,1);}.LB7kq .duRjpb{font-size: 64pt; letter-spacing: 2px; line-height: 1; margin-top: 40px;}.LB7kq .JYVBee{font-size: 25pt; font-weight: 300; line-height: 1.1; margin-top: 25px;}@media only screen and (max-width: 479px){.LB7kq .duRjpb{font-size: 40pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.LB7kq .duRjpb{font-size: 53pt;}}@media only screen and (max-width: 479px){.LB7kq .JYVBee{font-size: 19pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.LB7kq .JYVBee{font-size: 22pt;}}.O13XJf{height: 340px; padding-bottom: 60px; padding-top: 60px;}@media only screen and (min-width: 480px) and (max-width: 767px){.O13XJf{height: 280px; padding-bottom: 40px; padding-top: 40px;}}@media only screen and (max-width: 479px){.O13XJf{height: 250px; padding-bottom: 30px; padding-top: 30px;}}.SBrW1{height: 520px;}@media only screen and (min-width: 480px) and (max-width: 767px){.SBrW1{height: 520px;}}@media only screen and (max-width: 479px){.SBrW1{height: 400px;}}.Wew9ke{fill: rgba(255,255,255,1);}.gk8rDe{height: 180px; padding-bottom: 32px; padding-top: 60px;}.gk8rDe .zfr3Q{color: rgba(0,0,0,1);}.gk8rDe .duRjpb{color: rgba(34,110,147,1); font-size: 45pt; line-height: 1.1;}.gk8rDe .qLrapd{color: rgba(34,110,147,1);}.gk8rDe .JYVBee{color: rgba(34,110,147,1); font-size: 27pt; line-height: 1.35; margin-top: 15px;}.gk8rDe .aHM7ed{color: rgba(34,110,147,1);}.gk8rDe .OmQG5e{color: rgba(33,33,33,1);}.gk8rDe .NHD4Gf{color: rgba(33,33,33,1);}@media only screen and (max-width: 479px){.gk8rDe .duRjpb{font-size: 30pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .duRjpb{font-size: 38pt;}}@media only screen and (max-width: 479px){.gk8rDe .JYVBee{font-size: 20pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .JYVBee{font-size: 24pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe{padding-top: 45px;}}@media only screen and (max-width: 479px){.gk8rDe{padding-bottom: 0px; padding-top: 30px;}}.dhtgD{text-decoration: underline;}.JzO0Vc{background-color: rgba(33,33,33,1); font-family: Lato, sans-serif; width: 250px;}@media only screen and (min-width: 1280px){.JzO0Vc{padding-top: 48.5px;}}.TlfmSc{font-family: Lato, sans-serif; font-size: 15pt; font-weight: 300; line-height: 1.333;}.PsKE7e{font-family: Lato, sans-serif; font-size: 12pt;}.IKA38e{line-height: 1.21;}.hDrhEe{padding-bottom: 11.5px; padding-top: 11.5px;}.zDUgLc{opacity: 1;}.QmpIrf{background-color: rgba(30,108,147,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal; line-height: normal;}.KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.lQAHbd .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.lQAHbd .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.lQAHbd .Mt0nFe{border-color: rgba(255,255,255,0.200000003);}.cJgDec .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.cJgDec .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.tpmmCb .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.tpmmCb .KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.gk8rDe .QmpIrf{background-color: rgba(30,108,147,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.gk8rDe .KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.O13XJf .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.O13XJf .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.Y4CpGd{font-family: Lato, sans-serif; font-size: 11pt;}.CMArNe{background-color: rgba(242,242,242,1);}.LBrwzc .TlfmSc{color: rgba(0,0,0,0.8000000119);}.LBrwzc .YTv4We{color: rgba(0,0,0,0.6399999857);}.LBrwzc .YTv4We.chg4Jd:focus:before{border-color: rgba(0,0,0,0.6399999857); display: block;}.LBrwzc .Mz8gvb{color: rgba(0,0,0,0.6399999857);}.LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.LBrwzc .wgxiMe{background-color: rgba(255,255,255,1);}.LBrwzc .qV4dIc{color: rgba(0,0,0,0.6399999857);}.LBrwzc .M9vuGd{color: rgba(0,0,0,0.8000000119); font-weight: bold;}.LBrwzc .Zjiec{color: rgba(0,0,0,0.8000000119);}.LBrwzc .IKA38e{color: rgba(0,0,0,0.6399999857);}.LBrwzc .lhZOrc.IKA38e{color: rgba(0,0,0,0.8000000119); font-weight: bold;}.LBrwzc .j10yRb:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .eBSUbc{color: rgba(0,0,0,0.8000000119);}.LBrwzc .hDrhEe:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .jgXgSe:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .M9vuGd:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .zDUgLc{border-bottom-color: rgba(204,204,204,1); border-bottom-width: 1px; border-bottom-style: solid;}.fOU46b .LBrwzc .M9vuGd{color: rgba(0,0,0,0.8000000119);}.fOU46b .LBrwzc .jgXgSe:hover{color: rgba(0,0,0,0.8000000119);}.fOU46b .LBrwzc .zDUgLc{opacity: 1; border-bottom-style: none;}.fOU46b .LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .GBy4H .M9vuGd{color: rgba(255,255,255,1);}.fOU46b .GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.fOU46b .GBy4H .zDUgLc{opacity: 1;}.fOU46b .GBy4H .tCHXDc{color: rgba(255,255,255,0.8700000048);}.fOU46b .GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.XeSM4.G9Qloe.fOU46b .LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.XeSM4.G9Qloe.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.GBy4H .lhZOrc.IKA38e{color: rgba(255,255,255,1);}.GBy4H .eBSUbc{color: rgba(255,255,255,0.8700000048);}.GBy4H .hDrhEe:hover{color: rgba(255,255,255,1);}.GBy4H .j10yRb:hover{color: rgba(255,255,255,1);}.GBy4H .YTv4We{color: rgba(255,255,255,1);}.GBy4H .YTv4We.chg4Jd:focus:before{border-color: rgba(255,255,255,1); display: block;}.GBy4H .tCHXDc{color: rgba(255,255,255,0.8700000048);}.GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.GBy4H .M9vuGd{color: rgba(255,255,255,1);}.GBy4H .M9vuGd:hover{color: rgba(255,255,255,1);}.QcmuFb{padding-left: 20px;}.vDPrib{padding-left: 40px;}.TBDXjd{padding-left: 60px;}.bYeK8e{padding-left: 80px;}.CuqSDe{padding-left: 100px;}.Havqpe{padding-left: 120px;}.JvDrRe{padding-left: 140px;}.o5lrIf{padding-left: 160px;}.yOJW7c{padding-left: 180px;}.rB8cye{padding-left: 200px;}.RuayVd{padding-right: 20px;}.YzcKX{padding-right: 40px;}.reTV0b{padding-right: 60px;}.vSYeUc{padding-right: 80px;}.PxtZIe{padding-right: 100px;}.ahQMed{padding-right: 120px;}.rzhcXb{padding-right: 140px;}.PBhj0b{padding-right: 160px;}.TlN46c{padding-right: 180px;}.GEdNnc{padding-right: 200px;}.TMjjoe{font-family: Lato, sans-serif; font-size: 9pt; line-height: 1.2; margin-top: 0px;}@media only screen and (min-width: 1280px){.yxgWrb{margin-left: 250px;}}@media only screen and (max-width: 479px){.Zjiec{font-size: 15pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.Zjiec{font-size: 17pt;}}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12pt;}}@media only screen and (max-width: 479px){.duRjpb{font-size: 24pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.duRjpb{font-size: 29pt;}}@media only screen and (max-width: 479px){.JYVBee{font-size: 15pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.JYVBee{font-size: 17pt;}}@media only screen and (max-width: 479px){.OmQG5e{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.OmQG5e{font-size: 14pt;}}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12pt;}}@media only screen and (max-width: 479px){.TMjjoe{font-size: 9pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TMjjoe{font-size: 9pt;}}section[id="h.43c8334fe53a9a40_353"] .IFuOkc:before{opacity: 0.6;}section[id="h.43c8334fe53a9a40_155"] .IFuOkc:before{opacity: 0.1;}</style><script nonce="gYY9hjrpGoa2x03ppj4ihw">_at_config = [null,"AIzaSyChg3MFqzdi1P5J-YvEyakkSA1yU7HRcDI","897606708560-a63d8ia0t9dhtpdt4i3djab2m42see7o.apps.googleusercontent.com",null,null,null,null,null,null,null,null,null,null,null,"SITES_%s",null,null,null,null,null,null,null,null,null,["AHKXmL1yqyJUuC3wT2e0pQAVHJk41D3BPrf3tkBUam5j0tOk8xPyjVEYXngendnYf0_cdt1hWiFb",1,"CPTrt4Ke_IkDFa28IwAdbYsJZQ",1732700944594419,[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747263,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50561333,50561341,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71652840,71652848,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94353368,94353376,94390153,94390161,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444292,94444300,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086181,95086189,95087186,95087194,95087217,95087225,95111985,95111993,95112873,95112881,95118561,95118569,95135933,95135941,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95270945,95270953,95314802,95314810,95317985,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99452336,99452344,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101606928,101606936,101617516,101617524,101631040,101631048,101705089,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101875074,101875082,102047752,102047760]],null,null,null,null,0,null,null,null,null,null,null,null,null,null,"https://drive.google.com",null,null,null,null,null,null,null,null,null,0,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"v2internal","https://docs.google.com",null,null,null,null,null,null,"https://sites.google.com/new/",null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,"",null,null,null,null,null,null,null,null,null,null,null,null,6,null,null,"https://accounts.google.com/o/oauth2/auth","https://accounts.google.com/o/oauth2/postmessageRelay",null,null,null,null,78,"https://sites.google.com/new/?usp\u003dviewer_footer",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://www.gstatic.com/atari/embeds/83a60601c213b72fb19c1855fb0c5f26/intermediate-frame-minified.html",0,null,"v2beta",null,null,null,null,null,null,4,"https://accounts.google.com/o/oauth2/iframe",null,null,null,null,null,null,"https://2131379491-atari-embeds.googleusercontent.com/embeds/16cb204cf3a9d4d223a0a3fd8b0eec5d/inner-frame-minified.html",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://sites.google.com/view/spm-2022/accepted-papers",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,0,null,"",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,[1732700944595,"editors.sites-viewer-frontend_20241112.02_p1","695977640",null,1,1,""],null,null,null,null,0,null,null,0,null,null,null,null,null,null,null,null,20,500,"https://domains.google.com",null,0,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,1,0,1,0,0,0,0,null,null,null,null,null,"https://www.google.com/calendar/embed",null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,"PROD",0,null,0,null,1]; window.globals = {"enableAnalytics":true,"webPropertyId":"","showDebug":false,"hashedSiteId":"3d3254316c29cb47356c562896a144b7e4578cb976d1407a61d81d4c8610a004","normalizedPath":"view/spm-2022/accepted-papers","pageTitle":"Accepted Papers"}; function gapiLoaded() {if (globals.gapiLoaded == undefined) {globals.gapiLoaded = true;} else {globals.gapiLoaded();}}window.messages = []; window.addEventListener && window.addEventListener('message', function(e) {if (window.messages && e.data && e.data.magic == 'SHIC') {window.messages.push(e);}});</script><script src="https://apis.google.com/js/client.js?onload=gapiLoaded" nonce="gYY9hjrpGoa2x03ppj4ihw"></script><script nonce="gYY9hjrpGoa2x03ppj4ihw">(function(){}).call(this); </script><script nonce="gYY9hjrpGoa2x03ppj4ihw">const imageUrl = 'https:\/\/lh5.googleusercontent.com\/4-tpJZWCeylQOw9DhaIlFPqsjN7ouHuXMAT3t1HOR88C_WugZ_p-JXgLsjOskKj9Mu91WqJ1lrWq2mijriUsirk\x3dw16383'; function bgImgLoaded() { if (!globals.headerBgImgLoaded) { globals.headerBgImgLoaded = new Date().getTime(); } else { globals.headerBgImgLoaded(); } } if (imageUrl) { const img = new Image(); img.src = imageUrl; img.onload = bgImgLoaded; globals.headerBgImgExists = true; } else { globals.headerBgImgExists = false; } </script></head><body dir="ltr" itemscope itemtype="http://schema.org/WebPage" id="yDmH0d" css="yDmH0d"><div jscontroller="pc62j" jsmodel="iTeaXe" jsaction="rcuQ6b:WYd;GvneHb:og1FDd;vbaUQc:uAM5ec;"><div id="docs-banner-container"><div id="docs-banners"><div id="HB1eCd-mzNpsf-r8s4j-ORHb"></div><div id="HB1eCd-TZk80d-r8s4j-ORHb" aria-live="assertive" aria-atomic="true"></div></div><div class="HB1eCd-Vkfede-NBtyUd-PvRhvb-LwH6nd"></div></div><div jscontroller="X4BaPc" jsaction="rcuQ6b:WYd;o6xM5b:Pg9eo;HuL2Hd:mHeCvf;VMhF5:FFYy5e;sk3Qmb:HI1Mdd;JIbuQc:rSzFEd(z2EeY),aSaF6e(ilzYPe);"><div jscontroller="o1L5Wb" data-sitename="spm-2022" data-search-scope="1" data-universe="1" jsmodel="fNFZH" jsaction="Pe9H6d:cZFEp;WMZaJ:VsGN3;hJluRd:UADL7b;zuqEgd:HI9w0;tr6QDd:Y8aXB;MxH79b:xDkBfb;JIbuQc:SPXMTb(uxAMZ),LjG1Ed(a6mxbb);" jsname="G0jgYd"><div jsname="gYwusb" class="p9b27"></div><div jscontroller="RrXLpc" jsname="XeeWQc" role="banner" jsaction="keydown:uiKYid(OH0EC);rcuQ6b:WYd;zuqEgd:ufqpf;JIbuQc:XfTnxb(lfEfFf),AlTiYc(GeGHKb),AlTiYc(m1xNUe),zZlNMe(pZn8Oc);YqO5N:ELcyfe;"><div jsname="bF1uUb" class="BuY5Fd" jsaction="click:xVuwSc;"></div><div jsname="MVsrn" class="TbNlJb "><div role="button" class="U26fgb mUbCce fKz7Od h3nfre M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="GeGHKb" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div><div class="E2UJ5" jsname="M6JdT"><div class="rFrNMe b7AJhc zKHdkd" jscontroller="pxq3x" jsaction="clickonly:KjsqPd; focus:Jt1EX; blur:fpfTEe; input:Lg5SV" jsshadow jsname="OH0EC" aria-expanded="true"><div class="aCsJod oJeWuf"><div class="aXBtI I0VJ4d Wic03c"><span jsslot class="A37UZe qgcB3c iHd5yb"><div role="button" class="U26fgb mUbCce fKz7Od i3PoXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="lfEfFf" aria-label="Search" aria-disabled="false" tabindex="0" data-tooltip="Search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div><div class="EmVfjc SKShhf" data-loadingmessage="Loading…" jscontroller="qAKInc" jsaction="animationend:kWijWc;dyRcpb:dyRcpb" jsname="aZ2wEe"><div class="Cg7hO" aria-live="assertive" jsname="vyyg5"></div><div jsname="Hxlbvc" class="xu46lf"><div class="ir3uv uWlRce co39ub"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv GFoASc Cn087"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv WpeOqd hfsr6b"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv rHV3jf EjXFBf"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div></div></div><div role="button" class="U26fgb mUbCce fKz7Od JyJRXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="m1xNUe" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div></span><div class="Xb9hP"><input type="search" class="whsOnd zHQkBf" jsname="YPqjbf" autocomplete="off" tabindex="0" aria-label="Search this site" value="" aria-disabled="false" autofocus role="combobox" data-initial-value=""/><div jsname="LwH6nd" class="ndJi5d snByac" aria-hidden="true">Search this site</div></div><span jsslot class="A37UZe sxyYjd MQL3Ob"><div role="button" class="U26fgb mUbCce fKz7Od Kk06A M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="pZn8Oc" aria-label="Clear search" aria-disabled="false" tabindex="0" data-tooltip="Clear search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="fAUEUd" viewBox="0 0 24 24" focusable="false"><path d="M19 6.41L17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12z"></path><path d="M0 0h24v24H0z" fill="none"></path></svg></span></span></div></span><div class="i9lrp mIZh1c"></div><div jsname="XmnwAc" class="OabDMe cXrdqd"></div></div></div><div class="LXRPh"><div jsname="ty6ygf" class="ovnfwe Is7Fhb"></div></div></div></div></div></div></div><div jsname="tiN4bf"><style nonce="IzH6jV90a7AkC6G862_Z6g">.rrJNTc{opacity: 0;}.bKy5e{pointer-events: none; position: absolute; top: 0;}</style><div class="bKy5e"><div class="rrJNTc" tabindex="-1"><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jsname="z2EeY" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to main content</span></button></div><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf br90J" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf br90J" jsname="ilzYPe" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to navigation</span></button></div></div></div><div class="M63kCb N63NQ"></div><div class="QZ3zWd"><div class="fktJzd AKpWA fOU46b G9Qloe XeSM4 XxIgdb" jsname="UzWXSb" data-uses-custom-theme="false" data-legacy-theme-name="QualityBasics" data-legacy-theme-font-kit="Light" data-legacy-theme-color-kit="Blue" jscontroller="Md9ENb" jsaction="gsiSmd:Ffcznf;yj5fUd:cpPetb;HNXL3:q0Vyke;e2SXKd:IPDu5e;BdXpgd:nhk7K;rcuQ6b:WYd;"><header id="atIdViewHeader"><div class="BbxBP HP6J1d K5Zlne" jsname="WA9qLc" jscontroller="RQOkef" jsaction="rcuQ6b:JdcaS;MxH79b:JdcaS;VbOlFf:ywL4Jf;FaOgy:ywL4Jf; keydown:Hq2uPe; wheel:Ut4Ahc;" data-top-navigation="true" data-is-preview="false"><div class="DXsoRd YTv4We oNsfjf" role="button" tabindex="0" jsaction="click:LUvzV" jsname="z4Tpl" id="s9iPrd" aria-haspopup="true" aria-controls="yuynLe" aria-expanded="false"><svg class="wFCWne" viewBox="0 0 24 24" stroke="currentColor" jsname="B1n9ub" focusable="false"><g transform="translate(12,12)"><path class="hlJH0" d="M-9 -5 L9 -5" fill="none" stroke-width="2"/><path class="HBu6N" d="M-9 0 L9 0" fill="none" stroke-width="2"/><path class="cLAGQe" d="M-9 5 L9 5" fill="none" stroke-width="2"/></g></svg></div><nav class="JzO0Vc" jsname="ihoMLd" role="navigation" tabindex="-1" id="yuynLe" jsaction="transitionend:UD2r5"><a class="XMyrgf" href="/view/spm-2022/home"><img src="https://lh5.googleusercontent.com/8L7fyLjBQuz8cVaXbVuAYnP4jqrLismjnvndOJF-el8KW2sa7JD3qdHe21VP7HeWsc97ggQcngQ6BJ3Qkcb3XrQ=w16383" class="r9CsCb" role="img" aria-label="Site home"></a><ul class="jYxBte Fpy8Db" tabindex="-1"><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/home" data-url="/view/spm-2022/home" data-type="1" data-level="1">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/paper-submission" data-url="/view/spm-2022/paper-submission" data-type="1" data-level="1">Paper Submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/program-committee" data-url="/view/spm-2022/program-committee" data-type="1" data-level="1">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/spm-2022/accepted-papers" data-url="/view/spm-2022/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/contact-us" data-url="/view/spm-2022/contact-us" data-type="1" data-level="1">Contact Us</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/venue" data-url="/view/spm-2022/venue" data-type="1" data-level="1">Venue</a></div></div></li></ul></nav><div class="VLoccc K5Zlne QDWEj U8eYrb" jsname="rtFGi"><div class="Pvc6xe"><div jsname="I8J07e" class="TlfmSc YSH9J"><a class="GAuSPc" jsname="jIujaf" href="/view/spm-2022/home"><img src="https://lh5.googleusercontent.com/8L7fyLjBQuz8cVaXbVuAYnP4jqrLismjnvndOJF-el8KW2sa7JD3qdHe21VP7HeWsc97ggQcngQ6BJ3Qkcb3XrQ=w16383" class="lzy1Td" role="img" aria-label="Site home" jsname="SwcDWb"></a>&nbsp;</div><nav class="plFg0c" jscontroller="HXO1uc" jsaction="rcuQ6b:rcuQ6b;MxH79b:CfS0pe;" id="WDxLfe" data-is-preview="false" style="visibility: hidden;" role="navigation" tabindex="-1"><ul jsname="waIgnc" class="K1Ci7d oXBWEc jYxBte"><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/home" data-url="/view/spm-2022/home" data-type="1" data-level="1">Home</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/paper-submission" data-url="/view/spm-2022/paper-submission" data-type="1" data-level="1">Paper Submission</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/program-committee" data-url="/view/spm-2022/program-committee" data-type="1" data-level="1">Program Committee</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J M9vuGd" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/spm-2022/accepted-papers" data-url="/view/spm-2022/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/contact-us" data-url="/view/spm-2022/contact-us" data-type="1" data-level="1">Contact Us</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/venue" data-url="/view/spm-2022/venue" data-type="1" data-level="1">Venue</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf ZmrVpf oXBWEc" more-menu-item jsaction="mouseenter:Vx8Jlb; mouseleave:ysDRUd"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-expanded="false" aria-haspopup="true" data-level="1">More</a><div class="mBHtvb u5fiyc" role="presentation" title="Expand/Collapse" jsaction="click:oESVTe" jsname="ix0Hvc"><svg class="dvmRw" viewBox="0 0 24 24" stroke="currentColor" jsname="HIH2V" focusable="false"><g transform="translate(9.7,12) rotate(45)"><path class="K4B8Y" d="M-4.2 0 L4.2 0" stroke-width="2"/></g><g transform="translate(14.3,12) rotate(-45)"><path class="MrYMx" d="M-4.2 0 L4.2 0" stroke-width="2"/></g></svg></div></div></div><div class="oGuwee eWDljc RPRy1e Mkt3Tc" style="display:none;" jsname="QXE97" jsaction="transitionend:SJBdh" role="group"><ul class="VcS63b"><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/home" data-url="/view/spm-2022/home" data-type="1" data-in-more-submenu="true" data-level="2">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/paper-submission" data-url="/view/spm-2022/paper-submission" data-type="1" data-in-more-submenu="true" data-level="2">Paper Submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/program-committee" data-url="/view/spm-2022/program-committee" data-type="1" data-in-more-submenu="true" data-level="2">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/spm-2022/accepted-papers" data-url="/view/spm-2022/accepted-papers" data-type="1" data-in-more-submenu="true" data-level="2">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/contact-us" data-url="/view/spm-2022/contact-us" data-type="1" data-in-more-submenu="true" data-level="2">Contact Us</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/spm-2022/venue" data-url="/view/spm-2022/venue" data-type="1" data-in-more-submenu="true" data-level="2">Venue</a></div></div></li></ul></div></li></ul></nav><div jscontroller="gK4msf" class="RBEWZc" jsname="h04Zod" jsaction="rcuQ6b:WYd;JIbuQc:AT95Ub;VbOlFf:HgE5D;FaOgy:HgE5D;MxH79b:JdcaS;" data-side-navigation="false"><div role="button" class="U26fgb mUbCce fKz7Od iWs3gf Wdnjke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="R9oOZd" aria-label="Open search bar" aria-disabled="false" tabindex="0" data-tooltip="Open search bar" aria-expanded="false" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe tCHXDc YSH9J" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div></div></div><div jsname="mADGA" class="zDUgLc"></div></div><div class="TxnWlb" jsname="BDdyze" jsaction="click:LUvzV"></div></div></header><div role="main" tabindex="-1" class="UtePc RCETm" dir="ltr"><section id="h.43c8334fe53a9a40_353" class="yaqOZd LB7kq cJgDec nyKByd O13XJf KEFykf" style=""><div class="Nu95r"><div class="IFuOkc" style="background-size: cover; background-position: center center; background-image: url(https://lh5.googleusercontent.com/4-tpJZWCeylQOw9DhaIlFPqsjN7ouHuXMAT3t1HOR88C_WugZ_p-JXgLsjOskKj9Mu91WqJ1lrWq2mijriUsirk=w16383);" jsname="LQX2Vd"></div></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.43c8334fe53a9a40_356" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe lkHyyc"><p id="h.15n7bwj5fviw" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: center;"><span class=" jgG6ef" style="color: #ffffff; font-family: &#39;Times New Roman&#39;; font-variant: normal; vertical-align: baseline;"><strong>9</strong></span><sup style="color: #ffffff; font-family: &#39;Times New Roman&#39;; font-size: 10.799999999999999pt; font-variant: normal;"><strong>th</strong></sup><span class=" jgG6ef" style="color: #ffffff; font-family: &#39;Times New Roman&#39;; font-variant: normal; vertical-align: baseline;"><strong> International Conference on Signal, Image Processing and Multimedia (SPM 2022)</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: center;"><span style="color: #ffffff; font-family: &#39;Times New Roman&#39;; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>June 25 ~ 26, 2022, Copenhagen, Denmark</strong></span></p></div></div></div></div></div></div></div></div></div><div class="DnLU4" jsaction="JIbuQc:v5IJLd(ipHvib);"><div role="button" class="U26fgb mUbCce fKz7Od HqAAld Wew9ke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="ipHvib" aria-label="Scroll down" aria-disabled="false" tabindex="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="XE8yyf" viewBox="0 0 24 24" focusable="false"><path d="M7.41 7.84L12 12.42l4.59-4.58L18 9.25l-6 6-6-6z"/><path d="M0-.75h24v24H0z" fill="none"/></svg></span></span></div></div></section><section id="h.43c8334fe53a9a40_369" class="yaqOZd qeLZfd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.43c8334fe53a9a40_372" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><div id="h.cq53213o9yg0" class="GV3q8e aP9Z7e"></div><h3 id="h.cq53213o9yg0_l" dir="ltr" class="CDt4Ke zfr3Q OmQG5e" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.7999999999999998; margin-bottom: 4pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: center;" tabindex="-1"><div jscontroller="Ae65rd" jsaction="touchstart:UrsOsc; click:KjsqPd; focusout:QZoaZ; mouseover:y0pDld; mouseout:dq0hvd;fv1Rjc:jbFSOd;CrfLRd:SzACGe;" class="CjVfdc"><div class="PPhIP rviiZ" jsname="haAclf"><div role="presentation" class="U26fgb mUbCce fKz7Od LRAOtb Znu9nd M9Bg4d" jscontroller="mxS5xe" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;" jsshadow aria-describedby="h.cq53213o9yg0_l" aria-label="Copy heading link" aria-disabled="false" data-tooltip="Copy heading link" aria-hidden="true" data-tooltip-position="top" data-tooltip-vertical-offset="12" data-tooltip-horizontal-offset="0"><a class="FKF6mc TpQm9d" href="#h.cq53213o9yg0" aria-label="Copy heading link" jsname="hiK3ld" role="button" aria-describedby="h.cq53213o9yg0_l"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -11px"><svg class="OUGEr QdAdhf" width="22px" height="22px" viewBox="0 0 24 24" fill="currentColor" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z"/></svg></span></span></a></div></div><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Accepted Papers</strong></span></div></h3></div></div></div></div></div></div></div></div></div></section><section id="h.43c8334fe53a9a40_373" class="yaqOZd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.43c8334fe53a9a40_376" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p id="h.s7jn8ymxhmkd" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Supervised Machine Learning Algorithm for the Prediction of Fluid Flow Parameters</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Dr. P. Priyadharshini and M. Vanitha Archana, Department of Mathematics, PSG College of Arts and Science, Coimbatore, India</span></p><p id="h.ujwa0lktijo4" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">An incompressible MHD nanofluid boundary layer flow over a stretching surface employing Buongiornos design investigated by considering the heat and mass transfer convective states. The Brownian motion and thermophoresis models were used to implement the nanofluid model. Operating the similarity transmutations, transforms the governing nonlinear partial differential equations to ordinary differential equations consisting of the multiple slips (momentum, energy, and concentration) and later worked by using a program written together with the stiffness shifting in Wolfram Language. The consequences of different physical parameters, magnetic parameter M, Brownian motion parameter Nb, thermophoresis parameter Nt, Lewis number Le, Suction parameter temperature and concentration Biot numbers on the multiple slips as well as the variation of the skin friction coefficient, reduced Nusselt and reduced Sherwood numbers concerning M and for various values of physical parameters obtained graphically, then compared with other recent works in tabular form. Finally, introduce a new environment to employ machine learning by performing the sensitivity analysis based on the iterative method for predicting the variation of skin friction coefficient, reduced Nusselt number and, reduced Sherwood number concerning the magnetic parameter. Here is investigated for estimating the cost function by comparing the actual and expected outcomes to fit the best fit line with the help of graphical forms. Machine learning gives a powerful and intelligent data processing architecture, and may hugely enrich the existing research techniques and industrial application of fluid mechanics.</span></p><p id="h.5x3rzbaf90jy" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Magnetohydrodynamics, Nanofluid, Stiffness Shifting, Machine Learning Algorithms.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.jfz20a9uukf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Mining Biomedical Literature to Discover Natural Cure for Recurrent Disease</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Farhi Marir</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Hussein Fakhry</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Aida Azar</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">College of Technological Innovation, Zayed University, Academic City, Dubai, UAE, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">College of Medicine, Mohammed Bin Rashid University of Medicine and Health Sciences (MBRU), Dubai Health Care City, Dubai, United Arab Emirates</span></p><p id="h.oiem2ib79ogm" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The advances in digital data collection and storage technology allowed the storage of huge amounts of medical publications in MEDLINE database which contains more than 25 million references to journal articles and abstracts in life sciences and biomedicine. This research work builds on Swanson use of mathematical association between A and C concepts/terms through a list of B concept/terms retrieved from medical articles that contain either A&amp;B or B&amp;C terms links A to C. Swanson discovered evidence that fish oil (A) cure vessel blood disorder (C) and magnesium (A) help with migraine headache (C) which were clinically approved two years later. In this research paper we present co-occurrence mining algorithm and an A&amp;C pre-defined domain knowledge base (containing for instance Garlic Composition and Blood pressure causes) to filter and reduce the exponential number of shared B terms retrieved from MEDLINE articles using Swanson’s Arrowsmith machine. The reduced number of relevant B terms makes it easier to build scientific evidence to validate publicly known remedies for recurrent diseases like for instance garlic reduces blood pressure and honey relieves coughs and soothes a sore throat, etc.</span></p><p id="h.vd3tol2l4yfo" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Co-occurrence Text Mining, ABC Arrowsmith Discovery Machine, Dietary Aliments &amp; Disease Knowledge Base, and MEDLINE medical database.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.8ddivf6u7kky" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Brexit: Predicting the Brexit UK Election Results by Constituency using Twitter Location based Sentiment and Machine Learning</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">James Usher and Pierpaolo Dondio, School of Computing Technological University Dublin, Dublin, Ireland</span></p><p id="h.fbzsdg2x2k6a" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">After parliament failed to approve his revised version of the ‘Withdrawal Agreement’, UK Prime Minister Boris Johnson called a snap general election in October 2019 to capitalise on his growing support to ‘Get Brexit Done’. Johnson’s belief was that he had enough support countrywide to gain a majority to push his Brexit mandate through parliament based on a parliamentary seat majority strategy. The increased availability of large-scale Twitter data provides rich information for the study of constituency dynamics. In Twitter, the location of tweets can be identified by the GPS and the location field. This provides a mechanism for location-based sentiment analysis which is the use of natural language processing or machine learning algorithms to extract, identify, or distinguish the sentiment content of a tweet (in our case), according to the location of origin of said tweet. This paper examines location-based Twitter sentiment for UK constituencies per country and aims to understand if location-based Twitter sentiment majorities per UK constituencies could determine the outcome of the UK Brexit election. Tweets are gathered from the whisperings of the UK Brexit election on September 4th 2019 until polling day, 12th December 2019. A Naive Bayes classification algorithm is applied to assess political public Twitter sentiment. We identify the sentiment of Twitter users per constituency per country towards the political parties’ mandate on Brexit and plot our findings for visualisation. We compare the grouping of location-based sentiment per constituency for each of the four UK countries to the final Brexit election first party results per constituency to determine the accuracy of location-based sentiment in determining the Brexit election result. Our results indicate that location-based sentiment had the single biggest effect on constituency result predictions in Northern Ireland and Scotland and a marginal effect on Wales base constituencies whilst there was no significant prediction accuracy to England’s constituencies. Decision tree, neural network, and Naïve Bayes machine learning algorithms are then created to forecast the election results per constituency using location-based sentiment and constituency-based data from the UK electorate at national level. The predictive accuracy of the machine learning models was compared comprehensively to a computed-baseline model. The comparison results show that the machine learning models outperformed the baseline model predicting Brexit Election constituency results at national level showing an accuracy rate of 97.87%, 95.74 and 93.62% respectively. The results indicate that locationbased sentiment is a useful variable in predicting elections.</span></p><p id="h.d0br4xh8myfz" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">BREXIT Election, Twitter, Sentiment, UK Election.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.8z81nqtmm0oy" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Enhancing Motor Imagery Decoding Via Transfer Learning</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Olawunmi George and Sheikh Iqbal Ahamed, Computer Science Department, Marquette University, Milwaukee, Wisconsin, USA</span></p><p id="h.clsyx4t9scl8" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Motor imagery (MI) is arguably one of the most common brain-computer interface (BCI) paradigms. The decoding process, in many cases, involves the use of small amounts of data gathered over a period. The decoding performance might therefore be limited, due to the size of available data. Also, the non-stationarity of signals across sessions and subjects can pose a challenge to effective decoding. To solve these challenges, transfer learning is proposed as the suitable approach, which could yield optimal performance even with small amounts of data and handle the non-stationarity of signals with adaptation. It has been applied across domains and tasks where only small amounts of data are available and where signal distribution changes are more rapid. Transfer learning (TL) aids the decoding process by utilizing previous knowledge learnt in the decoding process to enhance future decoding. In this study, we apply the concept of transfer learning in the classifier space, yielding improvements in the decoding process up to 3%. We investigate its effect across two main scenarios: withinand across-subject motor imagery decoding. Within each of these scenarios, we consider how to optimally transfer useful knowledge, across sessions, to aid the decoding process, taking into consideration factors such as the update mode and data sources to be used for transfer across subjects. To our knowledge, this is one of the few works making such considerations in the application of transfer learning in electroencephalography (EEG)-based MI. From our results, we conclude that transfer learning is useful in motor imagery experiments, where small amounts of data are available, and can be used in mitigating the effect of non-stationarity across sessions and subjects.</span></p><p id="h.ba87hak7h7ug" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">EEG, BCI, motor imagery, deep learning, machine learning, transfer learning, knowledge transfer, supervised learning.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.20ciixx4n1xv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Study on Emotional State Change based on Dynamic Expression Similarity</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Yan Zhang, Xiangyang Feng and Ming Zhu, College of Computer Science and Technology, Donghua University, Shanghai, China</span></p><p id="h.3vblz03lann8" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Facial expressions can express different emotions.Similar facial expressions usually correspond to same emotions, and the changing process of emotional states is reflected in the dynamic changes of facial expressions. However, existing studies mainly focus on instantaneous emotional states, which cannot reflect the intensity of emotions.This paper proposes a method to study the process of emotion change based on dynamic expression similarity, which can evaluate not only changes in emotional state but also changes in emotional intensity.First, the features of dynamic expressions are extracted based on the VGG16 network model. Then, the cosine similarity of the expression features is calculated to match the corresponding emotions. At the same time, the expression intensity of each frame is calculated to evaluate the change in emotional intensity. The experimental results show that the similarity calculated in this paper is increased by 9.7% on average, which can be used for the study of emotional state.</span></p><p id="h.qxcjbbnyfpgs" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Dynamic Expression Similarity, The Emotional State Change, Emotional Intensity.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.j12qxsise261" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Anti-Virus Autobots: Predicting more Infectious Virus Variants for Pandemic Prevention through Deep Learning</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Glenda Tan Hui En</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1*</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, KoayTze Erhn</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1*</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Shen Bingquan</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Raffles Institution, Singapore, 1Raffles Institution, Singapore, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">DSO National Laboratories, Singapore</span></p><p id="h.7qhv0enrtryl" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">More infectious virus variants can arise from rapid mutations in their proteins, creating new infection waves. These variants can evade one’s immune system and infect vaccinated individuals, lowering vaccine efficacy. Hence, to improve vaccine design, this project proposes Optimus PPIme– a deep learning approach to predict future, more infectious variants from an existing virus (exemplified by SARS-CoV-2). The approach comprises (i)an algorithm which acts as a “virus” attacking a host cell. To increase infectivity, the “virus” mutates to bind better to the host’s receptor. 2 algorithms were attempted –greedy searchand beam search. The strength of thisvariant-host bindingwas then assessed by a transformer network we developed, with a high accuracy of 90%. With both components, beam search eventually proposed more infectious variants. Therefore, this approach can potentially enable researchers to develop vaccines that provide protection against future infectious variants before theyemerge, pre-empting outbreaks and saving lives.</span></p><p id="h.1cxg9e6aqbmj" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Virus Variants, Transformers, Deep Learning.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.4i7pqbf8zdmd" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Brand name: An Intelligent Mobile-based Environmental protection rating and suggestion platform using Artificial Intelligence and Text Recognition</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ximeng Zhang</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Yu Sun</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Yorba Linda High School, 19900 Bastanchury Rd, Yorba Linda, CA92886, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, 91768, Irvine, CA92620</span></p><p id="h.hko9borarqiw" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Recycling is an essential measurement to change waste into reusable material. In the US, only about 30% of solid wastes are properly recycled, compared to other developed countries such as Northern Ireland (50.6%), Japan(50%), Schotland (46.9%), Wales (56.9%), it is much lower. However, in the US, the amount of solid waste disposal has increased in the past decade, which leads to air pollution, water pollution, soil pollution and solid waste is also a cause of many diseases. Specifically, it is noticed that many people have difficulty realizing how well they are doing in the process of recycling. Therefore, an app based on dart language is created to check how well people recycle through a scoring system and collect data from grocery receipts to see if the app can help make the consumers’ receipts full of more recyclable items. And it is hypothesized that this app can increase efficiency in recycling and promote people to encourage individuals to use more recyclable items. A clear trend in my data of scores gained from my family grocery receipt each week shows that the amount of recyclables increase as the weeks go by since the number from the app did increase. The number I get from recycling pops up in my head as I do the weekly grocery shopping with my family and reminds me to buy more recyclable items. The app is proven helpful and does increase recycling efficiency to 95%. The product, as an app, will be widely used by smartphones.</span></p><p id="h.1gj9h3akdu8d" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Environmental protection, Artificial Intelligence, NLP.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.15z0w9qc21pv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Sustainable Hardware for Lpwan-based Location Tracking of Construction Assets within Smart Cities</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Anthony S. Deese</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Thomas Brennan</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Andrew Bechtel</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Joe Jesson</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, and Efrain Rodriguez</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Electrical and Computer Engineering, The College of New Jersey, Pennington, New Jersey, USA, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Civil Engineering, The College of New Jersey, Pennington, New Jersey, USA, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Tenna LLC, Edison, New Jersey, USA</span></p><p id="h.h4doehfp69gx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">This paper discusses the design and testing of an application of digital IoT technology to track relatively small and inexpensive non-powered assets like concrete roadway barriers within a smart city, focusing on knowledge innovation, organizational systems and technology, and location intelligence. This application is of significant interest to many private corporations. The authors objective is to develop, implement, and test wireless digital IoT hardware having the ability to track construction assets while being sufficiently inexpensive to warrant their placement on smaller assets while having sufficient range to track and communicate with assets over ranges up to 2.5km. The proposed solution is durable enough to withstand the stresses of use on construction sites and sustainable enough to operate for 5+ years without manual intervention or introducing an external energy source to recharge the unit. This paper provides significant physical test results that validate the efficacy of the approach in practical use-case scenarios.</span></p><p id="h.rnwte28fbhao" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Internet of Things (IoT), Wireless Network, Transportation.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.ybdb7vygttyp" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Verifying Outsourced Computation in an Edge Computing Marketplace</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Christopher Harth-Kitzerow &amp; Gonzalo Munilla Garrido, Technical University of Munich, Germany</span></p><p id="h.oxb0l7sxh17f" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">An edge computing marketplace could enable IoT devices (Outsourcers) to outsource computation to any participating node (Contractors) in their proximity. In return, these nodes receive a reward for providing computation resources. In this work, we propose a scheme that verifies the integrity of arbitrary deterministic functions and is resistant to both dishonest Outsourcers and Contractors who try to maximize their expected payoff. We tested our verification scheme with state-of-the-art pre-trained Convolutional Neural Network models designed for object detection. On all devices, our verification scheme causes less than 1ms computational overhead and a negligible network bandwidth overhead of at most 84 bytes per frame. Our implementation can also perform our verification scheme’s tasks parallel to the object detection to eliminate any latency overhead. Compared to other proposed verification schemes, our scheme resists a comprehensive set of protocol violations without sacrificing performance.</span></p><p id="h.5no7d8tuknf5" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Edge Computing, Internet of Things, Function Verification, Computing Marketplaces.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.c5poz3nmyown" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Parametric Security and Privacy Computing for Internet of Things</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Oluwadare Oatunji</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Oluwashola Adeniji</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Ukeme Sunday</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Science, University of Ibadan, Nigeria, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Science, University of Ibadan, Nigeria, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Lagos Business School, Lagos, Nigeria</span></p><p id="h.3cfsgy642pev" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Internet of things often referred to as (IOT) refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud. It comprises various components that enhances high level of technology in the digital world. IOT has helped to revolutionize the world in various fields such as digital tech, E-Health, Artificial Intelligence, Cybernetics, E-currency, robotic science and various aspect of lives. Since the introduction of IOT in the New Millennium, it has risen to be the back bone Organization via its Network. Despite the enormous benefit of IOT, security and privacy challenges has been a major factor militating against it. This is feasible via: insecurities, zero-day attacks, cyber threats, cyberattacks etc. Internet hijackers and cyber fraud stars are threatening the future of IOT.</span></p><p id="h.d5tj717dz6r6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">cyber-attack, Internet of things (IOT), Network Telescope, Computational Algorithm, security, Hardware, software, cloud computing.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.o20tz5hmhsno" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Prediction Models to Effectively Detect Malware Patterns in the IoT Systems</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Rawabi Nazal Alhamad</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Faeiz M. Alserhani</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Sciences, Jouf University, Saudi Arabia, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Engineering and Networks, Jouf University, Saudi Arabia</span></p><p id="h.2zxcmih4hqo0" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The rapid use of the Internet of Things (IoT) has influenced many domains including smart cities, cameras, wearables, smart industrial equipment, and other aspects of our daily lives. The IoT environment, on the other hand, deals with a huge data that needs to be kept secure from tampering or theft. This study proposes five deep and machine learning techniques for identifying malware in network traffic based on the IoT-23 dataset. Random Forest, XGBoost, Convolutional Neural Network (CNN), Catboost, and Long Short-Term Memory (LSTM) models are among the classifiers utilized. The dataset was preprocessed to remove unnecessary or missing data, and then the most significant features were extracted using a feature engineering technique. The highest overall accuracy achieved was 96% by applying all classifiers except LSTM which recorded a lower accuracy.</span></p><p id="h.64mtdxuqj2n9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Internet of things (IoT), Malware Detection, Feature Selection, Random Forest, Catboost, CNN, LSTM, XGBoost.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.89tebx1jrt51" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Scalable and Robust Intrusion Detection System to Secure the IoT Environments using SDN-enabled Architecture</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Tahani M. Alshammari</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Faeiz M. Alserhani</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Sciences, Jouf University, Saudi Arabia, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Engineering and Networks, Jouf University, Saudi Arabia</span></p><p id="h.iag69gkhvrgf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The adoption of the Internet of Things (IoT) is gaining traction due to the rapid development in smart devices and decreased prices of sensing devices. These IoT devices are more vulnerable to being attacked or compromised. In this research, we propose an SDN-based IoT Anomaly intrusion detection system which detects abnormal behaviors and attacks as early as possible. Three machine learning (ML) techniques, that is support vector machines (SVM), k-nearest neighbor (KNN) and random forest (RF) are used to design an IDS which is intended to be placed at the SDN controller in order to watch and learn the behavior of IoT devices over time, with any deviation from normal behavior being labeled as an attack. On the selected benchmark dataset, we tested and evaluated our model. We reported a comparison of the outcomes of the three machine learning algorithms, which show that Random Forest (RF) algorithm outperformed support vector machines (SVM) and k-nearest neighbor (KNN).</span></p><p id="h.dz5u9fsuas9o" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Internet of things (IoT), intrusion detection systems (IDS), Machine learning (ML), Software Defined networks (SDN).</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.fiox4zdqo77" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>“Floodie” Smart Flood Detection and Warning System</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Charith Jayakantha, Charm Theekshana, Malith Gayashan, Isuru Kumarasiri, Dhammika De Silva, Dinuka Wijendra, Faculty of Computing, Sri Lanka Institute of Information Technology (SLIIT), Malabe, Sri Lanka</span></p><p id="h.vcah6zaz9gdv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Sri Lanka faces floods almost in every year. The main reason for floods in Sri Lanka is, the lack of a proper system for predicting rainfall and floods and informing the public. As a solution, this research proposes to create a proper weather forecasting and water level forecasting system and visualize the flooding areas in a google map. In this research LSTM Model, Facebook prophet, grey model, Convolutional Neural Network and Arima model are used as forecasting models. In addition, create a device, which connected with IoT sensors to retrieve the real-time weather and flood water levels. Then real-time data are monitored in a web application. Then, after executing all predictions and validations which is implemented, highlight the spots which can be affected by flood disaster. And finally implement a chatbot to provide extensive knowledge about real-time weather data and forecasted data and others.</span></p><p id="h.8dxaqdprvsk7" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Internet of things (IoT), Arima Model, Facebook Prophet, Grey Model, Convolutional Neural Network.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.3xpz8etjj3zx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>The Development of Resource Allocation Management Systems [Rams] for Company A</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Samantha Hilario, Nicole Mallari, Martin Dizon, Inigo Salazar, Joel Mendoza, University of Asia and the Pacific, Pasig City, Metro Manila, Philippines</span></p><p id="h.ubggt1d4fc9m" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The researchers discovered that Company A is experiencing challenges in managing and tracking their furniture, appliances, and IT resources. The company currently uses MS Excel as their asset management; however, it became inefficient enough to be used in their business operations anymore since the company is growing and gaining more clients. The researchers meet with the client to discuss the issues, business processes, possible solutions, and other constraints. The researchers implemented an Agile Methodology approach in developing the Resource Allocation Management System [RAMS]. In addition, they would provide a web-based system that keeps track of the whole asset’s life cycle (item’s specifications, procurement, current user and location, and usage history) where every asset record is protected. In conclusion, the researchers found that the Agile approach was effective in identifying issues and designing solutions that tailor-fit to the client’s business.</span></p><p id="h.rdikhyysuhgn" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Asset management, Agile, Asset, Resources, MS Excel.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.ghmszyrty94y" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Multimedia Network Performance Assessment Under Different Operating Configurations</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">M.A. Ba Humaish, School of Science and Engineering, The American University in Cairo, Cairo, Egypt</span></p><p id="h.7k683zlul6g1" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Routing the packets from the source to the destination is the main responsibility of the network layer, so many routing algorithms in this layer can be used to select the best routes and data structure of packets. In this paper, we have used two routing protocols Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) to analyze the performance of a network. Different applications such as video, FTP, print, and voice were configured based on different parameters. Additionally, we have looked at the same networks behavior when we implement Quality of service using Weighted Fair Queuing algorithm (WFQ) and Multi-Protocol Label Switching protocol (MPLS) to ensure that the multimedia networks performance is a guaranteed endeavor. The simulation results analyzed using the Optimized Network Engineering Tools (OPNET), and we compared these protocols to the effectiveness and performance in the network topology, also Multimedia applications are analyzed also, and the most essential QoS requirements are determined and quantified.</span></p><p id="h.lydcfmxfdto4" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Quality of Service (QoS), Multimedia Applications, Open Shortest Path First (OSPF), Routing Information Protocol (RIP), Weighted Fair Queuing algorithm (WFQ) and Multi-Protocol Label Switching (MPLS).</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.j1x1wgefc38h" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>The usability challenges in E-banking and mobile banking applications</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Lul Mohamed Osman</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and DR. COLLINS ODUOR</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Student, Department of Computing, United States International University-Africa, Nairobi, Kenya, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Assistant Professor, School of Science and Technology, United States International University-Africa, Nairobi, Kenya</span></p><p id="h.c62abiiqvrf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The study aimed to identify the usability challenges of E-banking and mobile banking applications. Both quantitative and qualitative analyses were used in this study. For qualitative analysis, a review and analysis were done. This enabled the researcher to collect information on identifying the usability challenges of E-banking and mobile banking applications. This studys findings show that the users of internet banking and mobile banking applications encountered several challenges such as language barrier due to the use of English and Arabic languages in the banking applications. Some banking applications could not adapt to the different screen sizes. Compatibility issues were noted hence users on various mobile device operating systems such as iOS encountered issues accessing the applications. Some applications page take more time to load, and also, response time to customers is low. Some applications dont have a support center and no user guide to problems and application usage.</span></p><p id="h.du6628fgyhdl" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Usability, E-banking, mobile banking.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.xn8yd5elt8ci" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Architect: A Framework for the Migration to Microservices</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Evgeny Volynsky, Merlin Mehmed and Stephan Krusche, Technical University of Munich, Munich, Germany</span></p><p id="h.r16e1h0gv39" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The migration from a monolithic to a microservice architecture is a recurring step in many software projects. In this paper, we describe a case study of a migration process of the learning management system Artemis. We migrate the shared database into multiple databases based on the database-per-microservice pattern. We developed Architect, a framework which is based on a domain-specific language for building dependable distributed systems as a template to ensure the data consistency of the distributed transactions using the Saga pattern. The Architect framework helped to reduce the complexity of using the Saga pattern. It introduced the eventual consistency in a distributed database system and decreased the coupling of the data storage. Architect currently does not provide a software evolution approach. We will add support for reengineering projects, which can facilitate the migration process of existing system.</span></p><p id="h.bzbsq6233n7x" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Microservices architecture, Migration of monolithic application, Saga pattern, Domain-specific-language, Distributed transactions.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.3ur3gle0p2jr" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>A Novel Approach to Network Intrusion Detection System using Deep Learning for SDN: Futuristic Approach</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Mahmood Radhi Hadi</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Adnan Saher Mohammed</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Engineering, Karabük University, Karabük, Turkey, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Adnan Saher Mohammed, Karabük University, Karabük, Turkey</span></p><p id="h.zdwknatxpa1r" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Software-Defined Networking (SDN) is the next generation to change the architecture of traditional networks. SDN is one of the promising solutions to change the architecture of internet networks. Attacks become more common due to the centralized nature of SDN architecture. It is vital to provide security for the SDN. In this study, we propose a Network Intrusion Detection System-Deep Learning module (NIDS-DL) approach in the context of SDN. Our suggested method combines Network Intrusion Detection Systems (NIDS) with many types of deep learning algorithms. Our approach employs 12 features extracted from 41 features in the NSL-KDD dataset using a feature selection method. We employed classifiers (CNN, DNN, RNN, LSTM, and GRU). When we compare classifier scores, our technique produced accuracy results of (98.63%, 98.53%, 98.13%, 98.04%, and 97.78%) respectively. Our proposed approach was successful in binary classification and detecting attacks, implying that our approach (NIDS-DL) might be used with great efficiency in the future.</span></p><p id="h.zcd80hdwu4nx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Network Intrusion Detection System, Software Defined Networking, Deep Learning.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.vfiwzjbduwm4" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Quality Increases as the Error Rate Decreases</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Fabrizio dAmore, Department of Computer, Control and Management Engineering, Sapienza University of Rome, Italy</span></p><p id="h.wvs0uybg9xup" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">In this paper we propose an approach to the design of processes and software that aims at decreasing human and software errors, that so frequently happen, making affected people using and wasting a lot of time for the need of fixing the errors. We base our statements on the natural relationship between quality and error rate, increasing the latter as the error rate decreases. We try to classify errors into several types and address techniques to reduce the likelihood of making mistakes, depending on the type of error. We focus on this approach related to organization, management and software design that will allow to be more effective and efficient in this period where mankind has been affected by a severe pandemic and where we need to be more efficient and effective in all processes, aiming at an industrial renaissance which we know to be not too far and easily reachable once the path to follow has been characterized, also in the light of the experience.</span></p><p id="h.rzstblyce5go" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Errors, Quality, Processes, Governance, Digitalization, Digital hygiene, Information technology, Computer Science.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.irt8e6fc0rbr" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>A new Deep-Net architecture for ischemic stroke lesion segmentation</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Jazzar Nesrine</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Ali Douik</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">University of Sfax, National Enginneering School of Sfax, Noccs Lab, Tunis, Tunisia, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">National Enginneering School of Sousse, University of Sousse</span></p><p id="h.sv78e6o0r4up" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ischemic stroke, brain cells death due to a lack of oxygen, is a leading cause of long-term disability and death. Accurate diagnosis and timely intervention can effectively improve the blood supply of the ischemic stroke area and minimize brain damage. Recent studies have shown the potential to use magnetic resonance imaging (MRI) to provide contrast imaging to visualize and detect lesions. However, manual segmentation of the stroke lesion produced by MRI is a tedious and timeconsuming task. Therefore, the automatic ischemic stroke lesion segmentation method may shows excellent advantages. In this paper, we propose a novel deep learning method used to detect and localize brain ischemic stroke, a generalization encoder-decoder by modifying U-Net architecture. We integrate multi-path architecture into both encoder and decoder blocks to captures different levels of the encoded state, which helps in more robust decision-making for stroke lesion segmentation. In bottleneck of the architecture, we applied dilated blocks to improve the underlying predictive capabilities. The proposed method has been tested on the publicly accessible web platform provided by the MICCAI Ischemic Stroke Lesion Segmentation (ISLES) challenge. The results demonstrate that the proposed method achieves a mean dice coefficient 0.91 of with the training and 0.84 with the testing data respectively.</span></p><p id="h.eqo9w0lki0rm" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ischemic stroke segmentation, Convolutional neural network, UNet, MRI, Dilated blocks.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.otrxacvnnt9z" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Evaluation of Semantic Answer Similarity Metrics</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Farida Mustafazade</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Peter F. Ebbinghaus</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">GAM Systematic, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Teufel Audio</span></p><p id="h.4eh6q6ev09t3" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">We propose a cross-encoder augmented BERTScore model for semantic answer similarity trained on our new dataset of non-common names in English contexts. There are several issues with the existing general machine translation or natural language generation evaluation metrics, and question answering (QA) systems are indifferent in that sense. To build robust QA systems, we need the ability to have equivalently robust evaluation systems to verify whether model predictions to questions are similar to ground-truth annotations. The ability to compare similarity based on semantics as opposed to pure lexical overlap is important to compare models fairly and to indicate more realistic acceptance criteria in real-life applications. We build upon the first to our knowledge paper that uses transformer-based model metrics to assess semantic answer similarity and achieve higher correlations to human judgement in the case of no lexical overlap.</span></p><p id="h.udhwvdb2pmfq" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Question-answering, semantic textual similarity, exact match, pre-trained language models, cross-encoder, bi-encoder.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.6uxsioswmyi1" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Native and non-native speech fluency analysis using prat software. A case study of English natives and non-English natives.-natives speech rate</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Abderrahim Bouderbane, Department of English, University of Mila, Algeria</span></p><p id="h.vs25cx8ewpp" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">This research is conducted to investigate the characteristics of speaking fluently and its components like: pauses, filled pauses, and hesitations. These components are very important in speaking, and they are used to generate ideas, plan what to say next and organize the content. the aim of this research is to divide samples of recorded speech extracts of non-native speakers of English to distinguish between pauses, fillers and hesitations. A sample of ten native speakers (British), and 10 non native speakers (Algerian teachers of english) are evaluated using a software called Praat. This software is mainly used in phonetics to describe pitch, stress and intonation. This software can also be used to calculate the total time of speaking, and demonstrate the pauses graphically as they are produced by speakers.The measurement of one pause is made reliable by Praat as far as the measurement is adjustable at all levels (Styler 2013). The adjustment can start from a 0.00Hz to 5000 or 6000 Hz. This software cannot tell where one word start and where it ends. As such, the researcher needs to segment sound filles with information when using any sort of automated information. This is generally done by creating a textgrid annotation in a text file, which is saved separetly. These annotations are composed of different tiers which are marked either by intervals or specific points in the file. The results found that pauses and hesitations are more frequent and longer in non-native speaking production.</span></p><p id="h.cyqfg3qrg6s2" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Fluency, speech processing, native speakers, non-native speakers, Pratt software.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.wxjgxj5v50kn" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Country Specific Forecast of Covid-19 Infection: A Case Study of Thailand</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Louangtrath, P.I, Bangkok University International, Thailand</span></p><p id="h.57i2udoklcpu" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The purpose of this paper is to determine the rate of reproduction of COVID-19 in Thailand during the delta strain outbreak between June and August 2021. In so doing, the ASEAN countries were used as cohort group for comparison study. The data used in this research was obtained from the corona tracker website. The compartmental model was used for determining the rate of reproduction (Ro) where the population N is divided into three compartments. The rate of reproduction can be used as an indicator for COVID-19 spreading. If it means that the disease has died out. If it means that the disease is expanding. Using the generalized logistic function, the initial value was Q = 3,440; K = 18,912 and A = 2,290. We determined the growth rate for Thailand to be thus B = 8.5. By allowing C =1 we can solve for v with the end value of on July 31, 2021. By solving for v we obtain v = 0.05. With known v, we can find the solution to the generalized logistic equation of COVID-19 for Thailand’s daily infection. Our finding shows that the lag phase for Thailand is . We used series for the four types of COVID-19 variants to generate a linear equation under Weibull’s system analysis. We obtained a range between and. When X = 1 the range is making the herd immunity for Thailand to fall within a range of . These findings are useful to policy makers, public health officials and the general public because stakeholders can better be informed and take necessary preventive measures against the spread of COVID-19.</span></p><p id="h.l6a4ujlzqso3" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Compartmental Model, COVID-19, exponential function, growth model, Herd immunity, logistic function.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.le0j2z809dtb" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>A Distributed Energy-Efficient Unequal Clustering based Kruskal Heuristic for IoT Networks</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Mohamed Sofiane BATTA</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1, 2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Zibouda ALIOUAT</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Hakim MABED</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, and Malha MERAH</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">FEMTO-ST Institute/DISC, University of Bourgogne Franche-Comte, Montbeliard, France, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">LRSD Laboratory, Computer Science Dept, Ferhat Abbas University Setif 1, Setif, Algeria</span></p><p id="h.6kt5zfugpvpg" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Energy efficiency is a major concern and a critical issue for energy constrained wireless networks. In this context, clustering is commonly used for topology man- agement and maximizing the network lifetime. Clustering approaches typically use a multi-hopping mechanism where Cluster Heads (CHs) near the Base Sta- tion (BS) consume higher energy since they relay data of farther CHs. Therefore, nodes close to the BS are strangled with an overloaded routing task and tend to die earlier than their intended lifetime, which affects the network performance. This situation is known as the hot spot problem that induces unbalanced energy consumption among CHs. The concern in this work is to address the intra- clustering structure in large scale environments to tolerate the network scaling and reasonably balance the energy consumption among CHs. In this regard, we propose a new Unequal Clustering algorithm based on Kruskal heuristic (UCKA) to optimize the network lifetime. UCKA applies the Kruskal heuristic in a dis- tributed fashion to perform a minimum spanning tree within large cluster which strengthen the intra-cluster routing structure and reduce the energy devoted to wireless communications. To the best of our knowledge, this is the first solution that combines the Kruskal heuristic and the unequal clustering to extend the devices durability and alleviate the hot spot problem. Simulation results indi- cate that UCKA can effectively reduce the energy consumption and lengthen the network lifetime.</span></p><p id="h.tmb38mskmpcg" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">IoT, WSN, Energy-aware protocols, Unequal Clustering, Hot spot energy prob- lem, Kruskal Heuristic.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.m2scqovlqwn0" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Development Web Spatial Database System of the Royal Projects Under the Inspiration of King Rama 9Th</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ponthip Limlahapun and Puntip Jongkroy, Geography Department, Kasetsart University, Bangkok, Thailand</span></p><p id="h.ndzpozbf6gwv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">His Majesty King Bhumibol Adulyadej of Thailand, conferred with the title King Bhumibol or King Rama IX, was the ninth monarch of Thailand in the Chakri dynasty. His Majesty initiated more than 2,000 projects throughout his 70 year reign. He worked with diligence and inspired the Thai people in their living, gratitude, and morality. The Royal Development Projects Board (RDPB) collects all information, approves plans and activities, and directs, monitors, and coordinates the operation of government agencies and state enterprises concerning Royal Development Projects. The various kinds of projects spread all over the country, from north to south. The geolocation would present and benefit younger generations who may not realize where those projects took place. More than 50 years ago, his Majesty made an effort to visit the entirety of Thailand, even inconvenient places with poor road systems. Therefore, this research aims to develop an online web spatial database of the Royal Projects under the inspiration of King Rama 9th, which will manage various information (i.e., project name, covered areas, responsibility agencies) systematically based on geographic locations. Online data could be accessed anywhere, anytime, and at any place, and users can select their interest area/project based on places and project types, which is more flexible compared to information in printed text formats. The research process was comprised of data requested from the office of the RDPB, organizing it in a format used for further geospatial web development, as well as locating the projects’ location and designing a map display. The process discovered that the geocoding function embedded in a geographic information system (GIS) software (i.e., ArcGIS or QGIS) could not identify the locations in Thailand; therefore, written programming was used to search for the location in Google, which worked faster. Since there are approximately more than 2000 projects, online mapping should consider how quantitative data relates in a spatial form with map communication, aesthetics, and sufficient information. GIS could be applied in a variety of fields i.e., disaster, public facilities, utilities, etc. Data presentations in only number or text format may provide information that lacks project distribution or referenced surrounding areas. Therefore, the interactive map would help supplement the existing information to make it clearer and easier to understand. Additional, the virtual learning platform was developed to attract young generations.</span></p><p id="h.f4qets9m8fv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">geolocation, geospatial web-based system, royal projects, virtual learning platform.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.w9vrerudzr5f" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Analysis and evaluation of tracker tags efficiency</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Enrique Hern´andez-Orallo</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Antonio Armero</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Carlos Tavares Calafate</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Pietro Manzoni</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Engineering (DISCA), Universitat Polit`ecnica de Val`encia, Valencia, Spain, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Engineering Projects, Polit`ecnica de Val`encia, Valencia, Spain</span></p><p id="h.vkoy53br9jmg" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Tracker tags, such as Apple’s AirTags and Tile’s trackers, are small and cheap devices aimed at finding lost things. Tags use Bluetooth technology and community tracking to find the location of lost tags whenever a compatible smartphone passes nearby. When we lose a tag, several questions may arise: how are the chances of finding it? Or, when will we receive a notification of its detection? Unfortunately, companies such as Apple or Tile do not provide technical information about the efficiency of their tags. Thus, this paper aims to give answers to those questions based on a methodological analysis and evaluation of tags’ efficiency. The main aspects that impact the efficiency of finding a lost tag are the detection range, community size, and human mobility. These aspects are evaluated in a campus scenario, showing that the probability of finding lost tags is very high: more than 99% of them were found, and the average detection time was around 1 hour.</span></p><p id="h.59ux7au5ci8j" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Mobile Crowdsensing Opportunistic networks Internet of Things Performance Evaluation.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.m0h6qu7djr7q" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>A Review on Blockchain and its Security</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">G. N. R. Prasad</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and B. RAMADASU</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Senior Assistant Professor, Dept. of Master of Computer Applications,Chaitanya Bharathi Institute of Technology (Autonomous), Gandipet, Hyderabad – 500 075, India, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Assistant Professor, Dept. of Computer Science and Engineering,Chaitanya Bharathi Institute of Technology (Autonomous), Gandipet, Hyderabad – 500 075, India</span></p><p id="h.xu1s9ryl65zh" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Blockchainis the latest buzzwords in the field of Computer Science since the past four years. It has the potential to completely take over the traditional Financial Institutions we know since the past century and bring about Web 3.0. In order to do this the technology has to be highly secure. To understand how and why blockchain is so secure and reliable we need to first understand how the different blocks are linked together in a Blockchain Network. The blocks in a blockchain are linked with the help of a Hashing Algorithm. A hashing algorithm is a one-way mathematical function which generates a unique output for every unique input. The Bitcoin Network uses a SHA-256 hash. A basic block has a data, hash and previous hash field. The hash value of any block is dependent on the hash value of the previous block, therefore making it very difficult to alter the data as any tampering would require altering hashes of each and every subsequent block in the blockchain. A typical blockchain network can have millions of blocks on its chain. This makes it virtually impossible to alter the blockchain, thereby making it so secure. Blockchain is a decentralized technology [14]. It has a lot of power when it comes to solving business difficulties.Algorithms on the nodes validate blockchain transactions. A transaction cannot be initiated by a single entity. Finally, blockchains ensure transparency by allowing each participant to view transactions at any moment. Smart contracts ensure safe transactions, reducing the risk of third-party interruption. Decentralization and immutability are two key characteristics of blockchain. Faster transactions, transaction and validation in seconds, and so forth.</span></p><p id="h.ibslfte8zq3v" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">blockchain, cryptocurrency, hash, blocks.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.aie65q9l70k" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>On Accountable and Distributed Audit of Outsourced Data</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Amit Kumar Dwivedi</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Naveen Kumar</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Manik Lal Das</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">IIIT Vadodara, Gujarat, India, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">DA-IICT, Gandhinagar, Gujarat, India</span></p><p id="h.bnvvvdk8c9pl" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Data outsourcing in a third-party storage server is a costeffective business model, which is widely used by small and medium-sized enterprises. As data is managed by a third party, the accountability of the involved entities becomes an important aspect of this business model. Proof of violation of agreed terms between the data owner, users, and the storage service provider ensures accountability and is desirable as it enhances the trust of the data owner towards other system entities. Furthermore, strong accountability identifies the misbehaving entity’s activities and protects the honest entity from false accusations. In this paper, a strong, accountable distributed auditing scheme is proposed for outsourcing data in a public cloud setup. A proof-based solution with fine-grained read-write access is used to address the strong accountability and auditing of data as well as services. The scheme is analyzed and compared with the related schemes. The experimental results of the scheme show that the proposed scheme is efficient and practical.</span></p><p id="h.c4ais5byqhkr" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Accountability, Distributed audit, Data integrity, Distributed cloud.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.3mukv0xpatzt" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>An Experimental Evaluation Of Web-Based Tools For Detecting DeepFake</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Tahani M. Alshammari, Department of Computer and information sciences, Aljouf University, Saudi Arabia</span></p><p id="h.1hc3xhrvpe4z" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">In this paper, investigated the accuracy of classification of two free online deepfake detection tools. The results indicate the tools tested achieve very high performance when applied to datasets in which training and test data shares same cameras, types of manipulation and processing pipelines, but once applied to a black box dataset performance degrade. Most of the current models and methods developed for deepfake detecting depend heavily on the alignment between training set and test data. This demands taking a broader view and considering solutions that go beyond image and video analysis.</span></p><p id="h.9s27b7otyaqm" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">DeepFake Detection, Deep learning, Datasets, Deepware.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.ihl186y51ulc" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>An Intelligent Mobile Platformto Assist Customized Cosmetic Selection using Artificial Intelligence and Natural Language Processing</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Jenny Sun</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Yu Sun</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">JSerra Catholic High school, 26351 Junipero Serra Rd, San Juan Capistrano, CA92675, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, 91768, Irvine, CA92620</span></p><p id="h.jkhg5526088g" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Most teenagers have some types of skin blemishes and allergies that often go undiagnosed [4][5]. This can leadtomany unnecessary skin ailments and treatments that do not address the root of the problems [6]. This is especiallytrue for young women who are beginning to use makeup. This can lead to embarrassments and even isolation and depression. But with this Intelligent Mobile Platform app, teenagers, parents, and dermatologists can all be assistedin identifying specific skin conditions such as oily or dry skin, skin prone to breakouts and rashes, acne, or evenmore severe conditions such as eczema and psoriasis [7]. Once this app has made a proper diagnosis, it will recommend and prescribe proper skin treatments intended to avoid or solve potentially major physical andemotional problems. This paper is designed to discuss the ways that this app evolved into a productive andreputable device capable of improving the lives of millions of young teenagers as well as those of older ages whocontinue to struggle with skin problems.</span></p><p id="h.srrx3epe8q0f" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Natural Language Processing, Artificial Intelligence, Mobile Platform.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.2cozn3buqaln" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Separation Distance Reduction between 5G Nr Base Station and Satellite Earth Station at C-band</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Mohamed Ahmed M. Khalifa</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Hebat-Allah M. Mourad</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Mahmoud Abdelaziz</span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Electronics and Electrical Communications Dept, Faculty of Engineering, Cairo University, Giza, Egypt, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Electronics and Electrical Communications Dept, Faculty of Engineering, Cairo University, Giza, Egypt, </span><sup style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 8.4pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Communications and Information Engineering, University of Science and Technology in Zewail City, Giza, Egypt</span></p><p id="h.l2glhxyy40kr" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Increasing global data traffic made 5G (IMT-2020) a good solution, especially in the mid-band spectrum (such as the 3.5 GHz range) because it offers a good balance between coverage and capacity. Thus, some countries had identified it as one of the candidate bands for 5G. C-band (from 3400 to 4200 MHz) is a mainstay of satellite communications and is used to provide broadband connectivity in remote areas today. This paper discusses the feasibility of 5G (IMT-2020) and Fixed Satellite Service (FSS) system to coexist in the C-band range by analyzing the impact of the interference from 5G (IMT-2020) base stations towards the FSS earth station. This analysis is based on the most recent unwanted emissions limits used from 3GPP TS 38.104. The results show that in the adjacent channel scenario and by employing an elevation angle of 48° and a guard band from 41-100 MHz, 5G (IMT-2020) base station needs to be separated at least 0.295 Km away from the FSS earth station. The protection distance increases by 26.35 Km when decreasing the guard band to 30 MHz. So, a new unwanted emission limit is proposed to reduce the protection distance in the 30 MHz guard band scenario.</span></p><p id="h.mpd9e0muuipa" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">FSS, interference, 5G, C-band, IMT-2020 &amp; 5G BS.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p id="h.yx69rvsc4lzx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; vertical-align: baseline;"><strong>Cross Layer Intrusion Detection System of Mobile Ad Hoc Networks to Mitigate Black Hole Attack</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0;"><br></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 11.5pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Lahcene Mekadem and Malika Bourenane, Faculty of Exact &amp; Applied Sciences, University of Oran 1, Oran, Algeria</span></p><p id="h.u5nqi1vb1u7u" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Faced with the evolution of mobile wireless networks (MANET) and the diversity of its fields of application, it has become necessary to develop a more precise intrusion detection system by exploiting information extracted from several layers of the OSI model. This article proposes a cross layer intrusion detection system to mitigate black hole attacks in mobile wireless networks. The proposed system consists of two levels, at the first level the data extracted from several layers are used as inputs to a fuzzy logic system to determine the nature of a particular node (malicious node, normal node or suspicious node).At the second level, if a node is suspect, Dempster- Shafers theory will be applied to investigate that node. The proposed system, evaluated using the NS2 simulator, is found to be effective in detecting and isolating the malicious node.</span></p><p id="h.il3kdgu5v5tq" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.32; margin-bottom: 2pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 10pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 12pt; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Manet, Cross layer, Intrusion detection system, Fuzzy logic, Dempster-Shafers theory.</span></p></div></div></div></div></div></div></div></div></div></section><section id="h.43c8334fe53a9a40_365" class="yaqOZd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-c5RTEf Ft7HRd-AhqUyc-c5RTEf purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.43c8334fe53a9a40_368" class="hJDwNd-AhqUyc-c5RTEf Ft7HRd-AhqUyc-c5RTEf purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p dir="ltr" class="CDt4Ke zfr3Q"><span style="font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; vertical-align: baseline;"><strong>Contact Us</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q"><span class=" aw5Odc" style="font-family: &#39;Times New Roman&#39;; font-size: 12pt; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline;"><a class="XqQF9c" href="mailto:spmconf@yahoo.com" target="_blank">spmconf@yahoo.com</a></span></p></div></div></div></div></div></div></div><div class="hJDwNd-AhqUyc-Clt0zb Ft7HRd-AhqUyc-Clt0zb JNdkSc SQVYQc L6cTce-purZT L6cTce-pSzOP"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"></div></div></div></div></div></section></div><div class="Xpil1b xgQ6eb"></div><footer jsname="yePe5c"><section id="h.43c8334fe53a9a40_155" class="yaqOZd cJgDec nyKByd" style=""><div class="IFuOkc" style="background-size: cover; background-position: center center; background-image: url(https://lh6.googleusercontent.com/D17aGS2mTd_IaMAn-uaOPL1juBcUdC2jOfdxiYEI0zhwhgMuTATaMJtaUN8twTH2FMCaa2gRuE46O_v3exwvfBk=w16383);"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.43c8334fe53a9a40_158" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><small id="h.79gnolsxmfr6" dir="ltr" class="CDt4Ke zfr3Q TMjjoe" style="display: block; text-align: center;"><span style="color: #f8f9fa; font-family: &#39;Times New Roman&#39;; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Copyright © </span><span style="color: #f8f9fa; font-family: &#39;Times New Roman&#39;; font-size: 14pt; font-weight: normal; vertical-align: baseline;">SPM</span><span style="color: #f8f9fa; font-family: &#39;Times New Roman&#39;; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> 2022</span></small></div></div></div></div></div></div></div></div></div></section></footer><div jscontroller="j1RDQb" jsaction="rcuQ6b:rcuQ6b;MxH79b:JdcaS;FaOgy:XuHpsb;" class="dZA9kd ynRLnc" data-last-updated-at-time="1658552813402" data-is-preview="false"><div role="button" class="U26fgb JRtysb WzwrXb I12f0b K2mXPb zXBiaf ynRLnc" jscontroller="iSvg6e" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;;keydown:I481le;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="0" aria-haspopup="true" aria-expanded="false" data-menu-corner="bottom-start" data-anchor-corner="top-start"><div class="NWlf3e MbhUzd" jsname="ksKsZd"></div><span jsslot class="MhXXcc oJeWuf"><span class="Lw7GHd snByac"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span><div jsname="xl07Ob" style="display:none" aria-hidden="true"><div class="JPdR6b hVNH5c" jscontroller="uY3Nvd" jsaction="IpSVtb:TvD9Pc;fEN2Ze:xzS4ub;frq95c:LNeFm;cFpp9e:J9oOtd; click:H8nU8b; mouseup:H8nU8b; keydown:I481le; keypress:Kr2w4b; blur:O22p3e; focus:H8nU8b" role="menu" tabindex="0" style="position:fixed"><div class="XvhY1d" jsaction="mousedown:p8EH2c; touchstart:p8EH2c;"><div class="JAPqpe K0NPx"><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Google Sites" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:Toy3n;" jsname="V2zOu"><div class="jO7h3c">Google Sites</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" data-disabled-tooltip="Report abuse is not available in preview mode" aria-label="Report abuse" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jscontroller="HYv29e" jsaction="JIbuQc:dQ6O0c;" jsname="lV5oke" data-abuse-proto="%.@.null,null,&quot;https://sites.google.com/view/spm-2022/accepted-papers&quot;]" data-abuse-reporting-widget-proto="%.@.null,&quot;https://sites.google.com/view/spm-2022/accepted-papers&quot;]"><div class="jO7h3c">Report abuse</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Page details" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:hriXLd;" jsname="Rg8K2c"><div class="jO7h3c">Page details</div></div></span></div></div></div></div></div></div><div jscontroller="j1RDQb" jsaction="focusin:gBxDVb(srlkmf); focusout:zvXhGb(srlkmf); click:ro2KTd(psdQ5e);JIbuQc:DSypkd(Bg3gkf);MxH79b:JdcaS;rcuQ6b:rcuQ6b;" class="LqzjUe ynRLnc" data-last-updated-at-time="1658552813402" data-is-preview="false"><div jsname="psdQ5e" class="Q0cSn"></div><div jsname="bN97Pc" class="hBW7Hb"><div role="button" class="U26fgb mUbCce fKz7Od kpPxtd QMuaBc M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="-1" aria-hidden="true"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span></div><div jsname="srlkmf" class="hUphyc"><div class="YkaBSd"><div class="iBkmkf"><span>Page updated</span> <span jsname="CFIm1b" class="dji00c" jsaction="AHmuwe:eGiyHb; mouseover:eGiyHb;" tabindex="0" role="contentinfo"></span></div></div><div class="YkaBSd" jsaction="click:Toy3n;"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow jsname="V2zOu" aria-disabled="false" tabindex="0">Google Sites</div></div><div class="YkaBSd" jscontroller="HYv29e" jsaction="click:dQ6O0c;" data-abuse-proto="%.@.null,null,&quot;https://sites.google.com/view/spm-2022/accepted-papers&quot;]" data-abuse-reporting-widget-proto="%.@.null,&quot;https://sites.google.com/view/spm-2022/accepted-papers&quot;]"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow aria-label="Report abuse" aria-disabled="false" tabindex="0">Report abuse</div></div></div></div></div></div></div></div><script nonce="gYY9hjrpGoa2x03ppj4ihw">DOCS_timing['cov']=new Date().getTime();</script><script src="https://www.gstatic.com/_/atari/_/js/k=atari.vw.en_US.fw_mAcuwUyE.O/am=MBiA/d=1/rs=AGEqA5lwNXFYaHUUDGYHiMqlOO36DqQAOw/m=view" id="base-js" nonce="gYY9hjrpGoa2x03ppj4ihw"></script></div></div><div jscontroller="YV8yqd" jsaction="rcuQ6b:npT2md"></div></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10