Abstract is missing.
- From Baselines to DenseNet: A Deep Learning Framework for CNN Optimization and AugmentationHazim Shatnawi, Mahmoud Abusaqer, Jamil Saquer. 2-11 [doi]
- Full Speed Ahead: A Novel Selective Approach to Speed up Feature Extraction in Decentralized Federated LearningHaoran Pei, Xian Chen, Yili Jiang, Feng Wang, Linan Huang. 12-19 [doi]
- PortrAid: An AI-Driven Portrait Assistant for Professional-Quality Image CompositionJaspal Singh Kahlon, Gongbo Liang. 20-29 [doi]
- An Ad-Hoc Communication Assisted Distributed Particle Swarm Optimization Scheme for AUVs Underwater Search TaskBeichen Yang, Shuai Dong, Xiaoyan Hong. 30-39 [doi]
- An Equitable Profit Distribution Framework for SLA-Constrained and Dynamic Cloud FederationsByungkwan Jung, Suman Kumar. 40-48 [doi]
- Designing First-Aid Training Modules in Unity and VR for Smart Home EnvironmentsEric Xu, Inioluwa Kola-Adelakin, Oluwatoyin Damilola Akinbi, Hongmei Chi. 49-57 [doi]
- Assessing the Capabilities of Several Raspberry Pi Models for Virtualization with Proxmox VEEric Gamess, Sabin Banjara, Deuntae Winston. 58-66 [doi]
- Using a Raspberry Pi as a Network-Attached Storage Device: Performance and LimitationsEric Gamess, Graham Hester. 67-77 [doi]
- Affordable NTN to Bridge the Digital Divide: A Case Study on Women Micro-EntrepreneursNavrati Saxena, Abhishek Roy 0001, Sree Hari Karri, Melody Moh. 78-84 [doi]
- Cyber Social Threats: A Data-centric AI PerspectiveAdita Kulkarni. 85-94 [doi]
- On Development of SunSketcher: A Heliophysics Citizen Science ProjectJeffrey Galloway, Travis Blake Peden, Starr May, Kelly Miller, Tameka Ferguson, Tabitha Cline, Shikha Sawant, Andrea Florence, Kelcee Gabbard, Janessa Unseld, Hugh Hudson, Gordon Emslie, Greg Arbuckle, Leah Spalding, Mark Simpson. 95-104 [doi]
- Colocation Mining: Estimating Neighborhood Relationships and Identifying Regional PatternsAbigail Kelly, Arpan Man Sainju, Dipesh Shrestha, Ramchandra Rimal. 105-113 [doi]
- How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided InformationIrdin Pekaric, Clemens Sauerwein, Simon Laichner, Ruth Breu. 114-123 [doi]
- Scalable Consensus Framework with Adaptive Governance and Fault Tolerance for Blockchain EcosystemsSaurav Ghosh, S. M. Dedar Alam, Batuhan Tanrikulu, Reshmi Mitra, Indranil Roy. 124-133 [doi]
- A Comparison of Classical and Quantum Neural Network Algorithms for Malware DetectionArshiya Vyas, Dan Lo 0001, Xinyue Zhang. 134-144 [doi]
- Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and BenchmarkingSheikh Muhammad Farjad, Sandeep Reddy Patllola, Yonas Kassa, George Grispos, Robin Gandhi. 145-154 [doi]
- Students and Smartphone Usage: Influencing FactorsFarhad Mohammad Afzali, Elham Rastegari, Weihong Ning. 155-162 [doi]
- Topic Difficulty in a Python Data Structures Course: Student Perceptions and PerformanceLucas Layman, Toni Pence, Sridhar Narayan. 163-170 [doi]
- Enhancing Computer Science Education Using Learning Assistants: A Gamification ApproachMourya Reddy Narasareddygari, Vijayalakshmi Ramasamy, Daniel Cilone, Md Liakat Ali. 171-179 [doi]
- Integrating Prompt Structures Using LLM Embeddings for Cybersecurity ThreatsKavya Nikhita Meda, Pavan Subhash Chandrabose Nara, Svoboda Bozenka, Tarek Zormati, Seth Turner, Wayne Worley, Reshmi Mitra. 180-187 [doi]
- The Role of Generative AI Models in Requirements Engineering: A Systematic Literature ReviewPoonkuzhali Vasudevan, Sandeep Reddivari. 188-194 [doi]
- Academic Advising Chatbot Powered with AI AgentMichael Tamascelli, Olivia Bunch, Blake Fowler, Maryam Taeb, Achraf Cohen. 195-202 [doi]
- Efficient Hate Speech Detection: Evaluating 38 Models from Traditional Methods to TransformersMahmoud Abusaqer, Jamil Saquer, Hazim Shatnawi. 203-214 [doi]
- A Hybrid Approach of Data Mining and Deep Learning for Network Intrusion DetectionMd Shamsul Alam, Yash Rakeshbhai Patel, Yaswanthsrinivas Gurram, Chen Zhao, Dan Lo 0001. 215-220 [doi]
- Obstructive Lung Disease Classification from Electrocardiograms Using Machine LearningAboubacar Abdoulaye Soumana, Prajwol Lamichhane, Mehlam Shabbir, Xudong Liu, Mona Nasseri, Scott Helgeson. 221-226 [doi]
- Meta-Reinforcement Learning with Discrete World Models for Adaptive Load BalancingCameron Redovian. 227-232 [doi]
- Staged Multi-Omics Data Classification for Breast Cancer DiagnosisShrikar Kolla, Dan Lo, Chen Zhao. 233-238 [doi]
- Improving Merge Sort and Quick Sort Performance by Utilizing Alphadev's Sorting Networks as Base CasesAnas Gamal Aly, Anders E. Jensen, Hala ElAarag. 239-244 [doi]
- FireCrowdSensing: A Map-Based Web Application for Crowdsensing of Prescribed FiresTony Imbesi, Xiaolin Hu 0002, Ming Xin 0001, Haiyang Chao. 245-250 [doi]
- Using Machine Learning for Air Quality Prediction in Alabama: An Environmental Justice Case StudyArnav Maskey, Rajat Shinde. 251-256 [doi]
- Enhancing Energy Efficiency in Connected Vehicles through Multi-armed Bandits-Integrated Digital TwinsRabia Saleem, Omair Munir, Asad W. Malik, Samee U. Khan. 257-262 [doi]
- Forensic Investigation of Synthetic Voice Spoofing Detection in Social AppInioluwa Kola-Adelakin, Maryam Taeb, Hongmei Chi. 263-268 [doi]
- Experience Report from a Distributed Database Internals CourseRonald Nowling. 269-275 [doi]
- Learning to Drive: Evaluation of a Prototype to Prepare Children for a Power ChairAmber Wagner, Josh Fryer. 276-281 [doi]
- A ChatGPT-powered Prompt Engineering Framework for Generating Software Acceptance CriteriaJessica Rawson, Sandeep Reddivari. 282-288 [doi]
- Countering Hate Speech through Prosocial Student ProjectsRaquel Diaz-Sprague, Alan P. Sprague. 289-290 [doi]
- Post-Quantum Cryptography on Constrained Networks: A Comparison of Algorithm Performance at Low BandwidthsJared Sheldon, Sean Campbell, Joel Sanchez, Jay Pritchett, Bramwell Brizendine. 291-292 [doi]
- Preliminary Exploration of Object Detection Techniques for Autonomous DrivingSimran Devi, Hanieh Shabanian. 293-294 [doi]
- Preliminary Findings Toward Inclusive AI Education: Insights from CS and Non-CS StudentsHanieh Shabanian, Mahyar Pourghasemi, Simran Devi. 295-296 [doi]
- Study of Deep learning Architectures for Network Intrusion DetectionBimal Parakkal, Thomas A. Mazzuchi, Shahram Sarkani. 297-298 [doi]
- Mitigating Filter-Based Adversarial Attacks in BCIs through Model CompressionAnastasiia Bohachenko, Alison Gallegos, Noah Haynes, Kseniia Horai, Zion Lindsey, Luke Pennisi, Farhath Zareen. 299-300 [doi]