1 | Gender Identification using MFCC for Telephone Applications A Comparative Study
Jamil Ahmad, Mustansar Fiaz, Soon-il Kwon, Maleerat Sodanil, Bay Vo, and Sung Wook Baik | 351 |
2 | A Password Authentication Method Tolerant to Video-recording Attacks analyzing Multiple Authentication Operations
Yutaka Hirakawa, Yutaro Kogure, and Kazuo Ohzeki | 356 |
3 | Assessing the Electricity Storage for Renewable Energy in Saudi Arabia
Gafar Elamin, Mohamed Shwehdi, and Salih AlAwaji | 361 |
4 | Simulation Based Analysis of Load Flow and Grid Design for Electric Vehicle Charging: Bangladesh Chapter
A K M Kamrul Hasan, M. Al Mamun, and Abdullah Al Mahfazur Rahman | 366 |
5 | Assessing The Public Library Therapeutic Landscape Quality and Satisfaction: A Conceptual Framework
Haslinda Husaini, Siti Arpah Noordin, and Shamila Muhamad Shuhidan | 371 |
6 | Internet of Things New Challenges in Distributed Artificial Intelligence
Maroua Ahmid, Okba Kazar, Souraya Hamida, Laid Kahloul, and Parisa Ghoudous | 375 |
7 | Inadequate Support and Development Awareness Initiatives and Integration of ICT Innovations in Rural SMMEs: Case Study of Lepelle-Nkumpi Local Municip
Lethamaga Tladi, and Prof. Ray Kekwaletswe, PhD | 378 |
8 | ICT for Rural Development Anagha S. Chikate | 383 |
9 | Sentiment Analysis Technique: A Look into Support Vector Machine and Naive Bayes
Wandeep Kaur and Vimala Balakrishnan | 386 |