Abstract is missing.
- Multi-Tier Arrhythmia Detection: Achieving AI Hardware Compatibility Across Diverse NodesAdarsha Bhattarai, Yutong Liu, Dongming Peng. 1-7 [doi]
- Enhancing Pedestrian Safety: Predicting Movements with Deep Learning ModelsFaria Farzana, Damian Valles. 8-15 [doi]
- Traffic Safety through Machine Learning: A Study of Crash Severity FactorsSaddam Hossain, Damian Valles. 16-23 [doi]
- A Deep Learning Network for Classification and Visual Deterioration Detection of Concrete SurfacesB. Deepanraj, Hiren Mewada. 24-28 [doi]
- Ultrasonic Frequency Anomaly Localization with Machine and Deep LearningEvan R. Smith, Antonio T. Grahm, Joni E. McCawley, Damian Valles. 29-37 [doi]
- Reinforcement Learning-Driven Adaptive Traffic Routing Role Delegation for Enhanced SDN Network PerformanceHarsh Kumar, Petro Mushidi Tshakwanda, Sisay T. Arzo, Michael Devetsikiotis, Fabrizio Granelli. 38-44 [doi]
- Dataset Enlargement with Generative Adversarial Neural NetworksGavin E. Jackson, Damian Valles. 45-51 [doi]
- Enhancing Data Security and Privacy through Classification-Based Adaptive EncryptionRazaq Jinad, Tosin Akinsowon, Chukwuemeka Ihekweazu, Min Kyung An. 52-60 [doi]
- Smart Meter Performance Under Wired and Wireless Cyber Security AttackHarsh Kumar, Patrick Nnaji, Sanjeev Kumar. 61-67 [doi]
- Secure BACnet Device Communication and Verification for MS/TP NetworksTsion Yimer, Otily Toutsop, Kevin T. Kornegay. 68-76 [doi]
- Risk Assessment of Cybersecurity IoT Anomalies Through Cyber Value at Risk (CVaR)Prashant Vajpayee, Gahangir Hossain. 77-83 [doi]
- Enhanced Approaches to Similarity Analysis on Car Accident ReconstructionDamilola Oladimeji, Chiamaka Femi-Adeyinka, Juli Dutta, Min Kyung An. 84-90 [doi]
- Supply-Demand Balancing and Fairness Enhancement in Ride-Sharing Services: A Graph Reinforcement Learning Based ApproachJiyao Li, Vicki H. Allan. 91-99 [doi]
- A Transformer-Based Framework for Payload Malware Detection and ClassificationKyle Stein, Arash Golibagh Mahyari, Guillermo A. Francia III, Eman El-Sheikh. 105-111 [doi]
- Iridium Based Agronomical SystemN. G. Bharath Kumar, Omid Nia. 112-117 [doi]
- Boxing Strike Classification from Wearable IMU Sensor UnitChris Nagel, Cheol-Hong Min. 118-122 [doi]
- Quantitative Evaluation of KIRETT Wearable Demonstrator for Rescue OperationsMubaris Nadeem, Johannes Zenkert, Lisa Bender, Christian Weber 0003, Madjid Fathi. 123-128 [doi]
- Gamifying AI Education for Young Minds: The TransAI Adventure in LearningMehdi Roopaei, Ryan Roopaei. 129-134 [doi]
- DIM-YOLO: Desktop Item Management System Based on YOLOChencheng Tang, Jiahao Fan, Qilong Shi, Zhen Chen, Kaiwen Men, Yaodong Hu, Changxu Sun, Min Guo, Yisong Zhang, Xiaodong Ma. 135-141 [doi]
- Classification of Microcystins Based on Temperature Data in North Dakota LakeMeera Gopinath Sujatha, Rajesh Godasu, Prakash Ranganathan. 142-150 [doi]
- Smart Feeding: Integrating Deep Learning into Dairy Farm PracticesKyle King, Caleb Thornton, Mehdi Roopaei. 151-156 [doi]
- Network Intrusion Detection Using a Stacking of AI-driven Models with SamplingSamar AboulEla, Rasha F. Kashef. 157-164 [doi]
- Wavelet Based fMRI Analysis for Autism Spectrum Disorder Detection using Feature Selection and Ridge ClassifierFatemehsadat Ghanadi Ladani, Nader Karimi, Pejman Khadivi, Shadrokh Samavi. 165-171 [doi]
- Robust Training on the Edge: Federated vs. Transfer Learning for Computer Vision in Intelligent Transportation SystemsSergei Chuprov, Raman Zatsarenko, Dmitrii Korobeinikov, Leon Reznik. 172-178 [doi]
- Low-Power Embedded ECG Acquisition System for Real-Time Monitoring and AnalysisHirenkumar Kantilal Mewada, B. Deepanraj. 179-184 [doi]
- DetectPLD: A Federated CNN Approach for Collaborative Potato Leaf Disease DetectionMarufa Kamal, Rakib Hossain Rifat, Abanti Chakraborty Shruti, Mohd Ariful Haque, Kishor Datta Gupta, Roy George. 185-191 [doi]
- Context-Aware Orchestration of Energy-Efficient Gossip Learning SchemesMina Aghaei Dinani, Adrian Holzer, Hung X. Nguyen, Marco Ajmone Marsan, Gianluca Rizzo. 192-198 [doi]
- PyroScan: Wildfire Behavior Prediction System using Unmanned Aerial Vehicles (UAV)Derek Thompson, Parker Padgett, Timothy Cary Johnson, Bhaskar Ghosh. 199-204 [doi]
- Reducing Cyber Risks in IoT Device Resource Management: A Probabilistic Banker's Algorithm ApproachEnamul Hassan, Gahangir Hossain, Prashant Vajpayee. 205-211 [doi]
- Student Retention Model via Machine Learning and Predictive analysisMoshekwa M. Malatji, Rachel Mohlomi, Gerald Kirui, Simphiwe Mndebele, John E. D. Ekoru, Milka C. I. Madahana. 212-218 [doi]
- An Energy Efficiency Evaluation of the LTC3108 for Thermal Energy HarvestingMariana Marques Ferreira, Maria Paula Medeiros Gomes Miguel, Cleonilson Protásio de Souza, Yajun An, Orlando Baiocchi. 219-224 [doi]
- An Experimental Evaluation of a Thermal Energy Harvesting System for IoNTMaria Paula Medeiros Gomes Miguel, Mariana Marques Ferreira, Cleonilson Protásio de Souza, Yajun An, Orlando Baiocchi. 225-230 [doi]
- ResNet50 Pretrained Model Based Pneumonia Detection SystemMohale Tshwale, Pius A. Owolawi, Moses Olaifa, Vusi Malele. 231-236 [doi]
- Watermarking Using Polymorphic Algorithms For Increased Data SecurityMandeep Singh, Albert H. Carlson. 237-243 [doi]
- Preserving Medical Data with Renyi Differential PrivacyOlusola Tolulope Odeyomi, Harshitha Karnati, Austin Smith. 244-251 [doi]
- Agriculture 5.0 Cybersecurity: Monitoring Agricultural Cyber Threats with Digital Twin TechnologyKossi Bissadu, Gahangir Hossain, Prashant Vajpayee. 252-258 [doi]
- Enhanced Nuclei Segmentation in Histopathological Images Using a Novel Preprocessing Pipeline and Deep LearningAli Tamizifar, Pouya Behzadifar, Zahra Sobhaninia, Nader Karimi, Pejman Khadivi, Shadrokh Samavi. 259-264 [doi]
- Enhancing IoT Botnet Attack Detection in SOCs with an Explainable Active Learning FrameworkRajesh Kalakoti, Sven Nõmm, Hayretdin Bahsi. 265-272 [doi]
- Trust-Based Anomaly Detection in Federated Edge LearningRaman Zatsarenko, Sergei Chuprov, Dmitrii Korobeinikov, Leon Reznik. 273-279 [doi]
- A Neural Network based Deep Reinforcement Learning Controller for Voltage Regulation of Active Distribution NetworkJatin Jain, Ahmed A. Mohamed 0001, Tanvir Rahman, Mohamed A. Ali. 280-285 [doi]
- Prediction of Dissolved Oxygen in Shrimp Pond using Dolphin Glow Worm Optimization Based Radial Basis Function Neural NetworkA. P. Roger Rozario. 286-291 [doi]
- RFID-PIN Access Control System: Cost-Effective Security for Smart Home ApplicationsEric Rivera, Zoë Statzer, Hayssam El-Razouk, Zoulikha Mouffak. 292-299 [doi]
- Automated Waste Management using a Customized Vision-based Transformer ModelRasha Kashaf, Edwin P. Alegre, Tasnim Prova, Sakshi Aggarwal. 300-309 [doi]
- Computationally Efficient Global Optimization of Labelling in Non-Uniform QAM ConstellationsBrett Wiens, Daniel C. Lee 0001. 310-315 [doi]
- ULDP: A User-Centric Local Differential Privacy Optimization MethodWenjun Yang, Eyhab Al-Masri. 316-322 [doi]
- Scenario-Based Programming for IoT Applications DevelopmentTian-Xiao Lin, Zhen Chen, Min Guo, Yu-Xiang Lin, Yisong Zhang, Ying Gao, Xiao-Dong Ma, Kaiwen Men. 323-328 [doi]
- Digital Twins for Stress Management Utilizing Synthetic DataSandra Kumi, Madhurima Ray, Sanskriti Walia, Richard K. Lomotey, Ralph Deters. 329-335 [doi]
- AI-based detection for Remote Electrocardiogram Monitoring SystemMax Garcia, Sanjeev Kumar. 336-341 [doi]
- Preserving Details in Darkness: A VQ-VAE Based Approach with SSIM Loss for Low-Light Image EnhancementFarzaneh Koohestani, Zahra Nabizadeh-ShahrBabak, Nader Karimi, Shadrokh Samavi. 342-348 [doi]
- Performance Analysis of Machine Learning Algorithms on Imbalanced DDoS Attack DatasetDipok Deb, Hansapani Rodrigo, Sanjeev Kumar. 349-355 [doi]
- Using AI and Big Data in the HealthCare Sector to help build a Smarter and more Intelligent HealthCare SystemSanjeev Kumar V. Marimekala, John Lamb, Robert Epstein, Vasundhara Bhupathi. 356-362 [doi]
- Enhanced Segmentation in Abdominal CT Images: Leveraging Hybrid CNN-Transformer Architectures and Compound Loss FunctionFatemeh Piri, Nader Karimi, Shadrokh Samavi. 363-369 [doi]
- Inference-Optimized Metaheuristic Approach for a Prospective AI Training/Inference Inversion Paradigm in Optimized Energy-Aware ComputingS. Chan. 370-379 [doi]
- Improved Polyp Segmentation of Irregular Shapes in Colonoscopy ImagesSwagat Ranjit, Jian Zhang, Bijaya B. Karki. 380-386 [doi]
- Programming by Demonstration using Mixed Reality and Simulated KinematicsTaylor C. Washington, Winston Sealy. 387-392 [doi]
- Cascading Succession of Models for an Enhanced Long-Tail Discernment AI SystemS. Chan. 393-401 [doi]
- Model Order Estimation for Sensor Array Observations using a Neural NetworkKaushallya Adhikari, Ridhab Al Kinani. 402-407 [doi]
- GA-Net: Global-aware Attention-guided CNN for Food Image ClassificationAlvin Wang, Lujun Zhai. 408-413 [doi]
- Dissecting the Origins of the Power Side-Channel in Deep Neural NetworksSayed Erfan Arefin, Abdul Serwadda. 414-420 [doi]
- Design of Autonomous Rover for Firefighter Rescue: Integrating Deep Learning with ROS2Saad A. Rafiq, Erich S. Ellsworth, Oscar Resendiz, Susmitha H. Varanasi, Adenrele A. Ishola, Rachel M. Koldenhoven, John W. Farrell, Yumeng Li, Maria D. Resendiz, Semih Aslan, Ting Liu, Damian Valles. 421-428 [doi]
- Autonomously Reconfigurable Robot Coupled with Intelligent Vision and Control System for Rapid Runtime AdaptationGvarami Labartkava, Nurin Binti Suhaimi, Thiago Silva, Lev Kirischian. 429-434 [doi]
- "Hyper Photography" Artifact: An interactive aesthetic education experience device designed based on AIGCYishan Liu, Zhen Chen, Xin Xie, Yaodong Hu, Lie Zhang, Weiran Li, Shuangshou Li. 435-443 [doi]
- Modeling dynamic elasticity on intraday volatility and volume by finding PDEs using machine learningDavid D. Li, Angela Li, Rodger Mensing, Zy Li. 444-450 [doi]
- Mystery Game Script Compose Based on a Large Language ModelJiameng Li, Zhen Chen, Weiran Lin, Liangjun Zou, Xin Xie, Yaodong Hu, Dianmo Li. 451-455 [doi]
- Big Data and the Application of IoT SystemsOtily Toutsop, Tsion Yimer, Kevin T. Kornegay. 456-464 [doi]
- Fusion Models for Cyber Threat Defense: Integrating Clustering with Kmeans, Random Forests, and SVM against Windows MalwareAzita Ramezani. 465-470 [doi]
- An Open Source Framework for Benchmarking Cyberbullying Detection on Social MediaRoya Salek Shahrezaie, Parisa Hajibabaee, Mohsen Ahmadi. 471-478 [doi]
- Minimum Distance Receiver using Dynamic Programming-Based Sparse SamplesZaynah L. Kalaoun, Kaushallya Adhikari, Steven Kay. 479-484 [doi]
- Phishing URL Detection Using Machine Learning and Deep LearningRawshon Ferdaws, Nahid Ebrahimi Majd. 485-490 [doi]
- Product Recommendation System Using Large Language Model: Llama-2MuhammadZaid Katlariwala, Aakash Gupta. 491-495 [doi]
- Hybrid Data-Driven Learning-Based Internet of Things Network Intrusion Detection ModelOyeniyi Akeem Alimi. 496-501 [doi]
- Scalable Multimodal Machine Learning for Cervical Cancer DetectionThuan Nhan, Jiblal Upadhya, Samir Poudel, Satish Wagle, Khem Poudel. 502-510 [doi]
- Arbitrated Packet Switching With Machine Learning Driven Data PlaneAlex Sumarsono, Bhuvana Prakash, Christian Leon. 511-517 [doi]
- Dissection of Rorschach RansomwareDharati Dholariya, Dixit Panchal, Pallavi Singhal. 518-520 [doi]
- Deep Learning-Based Cyber Attack Detection in Power Grids with Increasing Renewable Energy PenetrationM. A. S. P. Dayarathne, M. S. M. Jayathilaka, R. M. V. A. Bandara, V. Logeeshan, S. Kumarawadu, Chathura Wanigasekara. 521-526 [doi]
- Enhancing AI Systems with Agentic Workflows Patterns in Large Language ModelAditi Singh, Abul Ehtesham, Saket Kumar, Tala Talaei Khoei. 527-532 [doi]
- Comparative Analysis of Physical Design Parameters for JPEG Encoder IP using OpenROADPurav Bhatt, Shrikant Jadhav. 533-539 [doi]
- Self-Adaptive Non-Intrusive Load Monitoring Using Deep LearningS. M. L. Arampola, M. S. K. Nisakya, W. A. Yasodya, S. Kumarawadu, V. Logeeshan, Chathura Wanigasekara. 540-545 [doi]
- Evaluation of Protocol-Centric IDS for the IoMT Leveraging ML TechniquesPuthiyavan Udayakumar, R. Anandan. 546-551 [doi]
- Optimizing Cervical Cancer Prediction, Harnessing the Power of Machine Learning for Early DiagnosisMahadi Hasan, Jahirul Islam, Miraz Al-Mamun, Afrin Akter Mim, Sharmin Sultana, Md Sanowar Hossain Sabuj. 552-556 [doi]
- SVM for Classification of Ten-Finger Imagined Movements using tEEG SignalsRafael Da Luz Barbosa, Kaushallya Adhikari, Walter G. Besio. 557-561 [doi]
- Accurate Prediction of Remaining Useful Life for Lithium-ion Battery Cells Using Deep Neural NetworksShamaltha M. Wickramaarachchi, S. A. Dewmini Suraweera, D. M. Pasindu Akalanka, V. Logeeshan, Chathura Wanigasekara. 562-568 [doi]
- Development of Deep Learning Model to Detect Cyber-Attacks within Vehicular NetworksR. D. Sandakelum, V. H. Liyanage, P. M. Chandrasekara, V. Logeeshan, S. Kumarawadu, Chathura Wanigasekara. 569-574 [doi]
- Internet of Things Security and Data Privacy Concerns in Smart FarmingEmmanuel Kojo Gyamfi, Jess Kropczynski, Joseph S. Johnson, Mustapha Awinsongya Yakubu. 575-583 [doi]
- Anonymous Batch Message Authentication Aided by Edge Servers in Industrial Internet of ThingHan Yu, Jianhong Zhou, Maode Ma. 584-590 [doi]
- EAIA: An Efficient and Anonymous Identity Authentication Protocol for V2V Communications in Internet of VehiclesQianmin Du, Jianhong Zhou, Maode Ma. 591-597 [doi]
- Human Occupancy From Few Diverse SensorsSudarshan S. Chawathe. 598-604 [doi]
- A Comprehensive Systematic Review of Blockchain-based Intrusion Detection SystemsGideon Adele, Abinash Borah, Anirudh Paranjothi, Mohammad S. Khan, Vladimir K. Poulkov. 605-611 [doi]
- Secure Data Provenance in Internet of Vehicles with Data Plausibility for Security and TrustAnuj Nepal, Mohamed Ahzam Amanullah, Robin Doss, Frank Jiang 0001. 612-618 [doi]
- Large Language Model-Driven Immersive AgentAditi Singh, Saket Kumar, Abul Ehtesham, Tala Talaei Khoei, Deepshikha Bhati. 619-624 [doi]
- Exploring Fine-Grained Feature Analysis for Bird Species Classification using Layer-wise Relevance PropagationKyle Arquilla, Ishan Dilipbhai Gajera, Melanie Darling, Deepshikha Bhati, Aditi Singh, Angela Guercio. 625-631 [doi]