Abstract is missing.
- Accurate and Efficient Implementations of Recursive Filtering based on SIMD and Cascaded FormHaotian Zhai, Bernd-Peter Paris. 1-7 [doi]
- Deep Learning and Game Theory for AI-Enabled Human-Robot Collaboration System Design in Industry 4.0Yuan Xing, Dongfang Hou, Jason Liu, Holly Yuan, Abhishek Verma, Wei Shi. 8-13 [doi]
- Next-Generation Reservoir Computing (NG-RC) Machine Learning Model for Advanced CybersecurityAndre Slonopas, Harry Cooper, Elliott Lynn. 14-21 [doi]
- Efficient Repair Configuration Algorithm, for Improving Yield of Semiconductor MemoriesVivek Nautiyal. 22-27 [doi]
- FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial AttacksMarc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul-Rahman, Edward Bowen. 28-35 [doi]
- Image based and Point Cloud based Methods for 3D View Reconstruction in Real-time EnvironmentArya Agrawal, Teena Sharma, Nishchal K. Verma, Shantaram Vasikarla. 36-42 [doi]
- Early Prediction of Characteristic Compressive Strength of Concrete Based on Mix Proportions Using Modified Dimensional AnalysisNikhil M. Pawar, Shubham Gujar, Hemant B. Dhonde, Damian Valles. 43-52 [doi]
- Exploring the Influence of Preoperative Variables on Patient Satisfaction: A Machine Learning Approach in Rotator Cuff Repair SurgeriesArti Taneja, Thomas M. Talavage, Brian M. Grawe, Sean Catlett, Henry Kuechly, Sarah Kurkowski, Jonas Keller. 53-62 [doi]
- Imputing ADS-B/GPS Dropouts using Machine Learning ModelsBarathwaja Subash Chandar, Prakash Ranganathan, William Semke. 63-72 [doi]
- Revolutionizing Mental Health Care through LangChain: A Journey with a Large Language ModelAditi Singh, Abul Ehtesham, Saifuddin Mahmud, Jong-Hoon Kim. 73-78 [doi]
- Large Language Model-Based Architecture for Automatic Outcome Data Extraction to Support Meta-AnalysisFatemeh Shah Mohammadi, Joseph Finkelstein. 79-85 [doi]
- Conversational Swarm Intelligence amplifies the accuracy of networked groupwise deliberationsLouis B. Rosenberg, Gregg Willcox, Hans Schumann, Ganesh Mani. 86-91 [doi]
- Machine Learning Approaches for COVID-19 Sentiment Analysis: Unveiling the Power of BERTShobhit Srivastava, Mrinal Kanti Sarkar, Chinmay Chakraborty. 92-97 [doi]
- Advancing Cattle Health: AI-Driven Innovations in Lameness Detection and ManagementMehdi Roopaei, Collin Bergmann, Asad Azemi, Krista Hardyman, James Hampton. 98-104 [doi]
- Building a Cloud Infrastructure for Virtual Machine Scheduling in DatacentersJonathan Chua, Xunfei Jiang. 105-110 [doi]
- Assessing the contamination intensity of Porcelain insulators using deep learning networks by UAVSaeed Ebadollahi, Balbir Bob Gill, Hamid Reza Khosravani, Foad Masih Pour. 111-118 [doi]
- Online Supervised Learning Algorithm for Dendritic Spiking Neural Networks with Nonlinear Synaptic IntegrationYaohui Zou, Xianghong Lin, Yuan Zhao. 119-125 [doi]
- Distributed and Efficient Storage of High-Dimensional Data Using Artificial Neural NetworkXiaohe Wu, Ahmed Badi, Juan Calderón. 126-132 [doi]
- GlitchOS: An Open Source Virtual AssistantWilliam Husen, Hynek Boril, Mehdi Roopaei. 133-137 [doi]
- Assuring Safe Navigation and Network Operations of Autonomous ShipsLuis Rivas, Spencer Stevens, Andrew Zitter, Vinayak Khandelwal, Amodini Vardhan, Chinmay Lohani, Chris Rouff, Lanier Watkins. 138-143 [doi]
- A Prediction Model for Short Price Jump in Cryptocurrency MarketMohammad Javad Rajaei, Qusay H. Mahmoud. 144-150 [doi]
- Estimating GPS/ADS-B Dropouts in the OpenSky Network PlatformAnton Skurdal, Akshay Ram Ramchandra, Prakash Ranganathan. 151-159 [doi]
- Improving Performance and Battery Consumption through Edge ComputingDaniel Myers, Wei Hao. 160-166 [doi]
- Optimal Task Admission Control of Private Cloud Data Centers With Limited ResourcesWenlong Ni, Yuhong Zhang, Wei Li 0040. 167-172 [doi]
- Advancing Occupancy Detection through Deep Learning and Sensor IntegrationRakeshkumar V. Mahto, Kanika Sood. 173-177 [doi]
- A Survey and Comparative Analysis of Methods for Countering Sybil Attacks in VANETsGideon Adele, Abinash Borah, Anirudh Paranjothi, Mohammad S. Khan. 178-183 [doi]
- Design of a Novice-Friendly Drone Control SystemJinsai Cheng, Saifuddin Mahmud, Misbahuddin Mohammed, Aditi Singh, Jong-Hoon Kim. 184-190 [doi]
- Elephant: LLM System for Accurate RecantationsPraise Chinedu-Eneh, Trung T. Nguyen. 191-197 [doi]
- Hierarchical Software Framework for Safe Unmanned Aerial Systems Integration into National Airspace (NAS)Jaya Preethi Mohan, Prakash Ranganathan, Hassan Reza. 198-206 [doi]
- Feature Selection Using the Advanced Shapley ValueAyesh Meepaganithage, Suman Rath, Mircea Nicolescu, Monica N. Nicolescu, Shamik Sengupta. 207-213 [doi]
- Designing a High School Course on Machine Learning for Cyberthreat AnalyticsKossi Bissadu, Gahangir Hossain. 214-219 [doi]
- Stochastic Optimization on Parking Lots for Smart Parking Using Reinforcement Learning MethodsDavoud Khatermohammadi, Seyed Amir Ghalari, Saeed Ebadollahi, Bob Gill. 220-227 [doi]
- Enabling Rural IoV Communication through Decentralized Clustering and Federated LearningChandler Scott, Mohammad S. Khan, Anirudh Paranjothi, Joshua Qiang Li. 228-234 [doi]
- Knowledge-Based Modeling Approach: A Schematic Design of Artificial Intelligence of Things (AIoT) for Hydrogen Energy SystemSalaki Reynaldo Joshua, Sanguk Park, Kihyeon Kwon. 235-241 [doi]
- Analysis of Hockey Forward Line Corsi: Should the Focus Be on Forward Pairs?Samuel Brownlee, Ayesha Khan, Barnaby Vanderzyl, Mohamad El Hajj. 242-248 [doi]
- Development of an Augmented Reality Handwashing Tool for Children with Autism Spectrum DisorderEvan R. Smith, Rachel M. Koldenhoven, John W. Farrell, Semih Aslan, Maria D. Resendiz, Yumeng Li, Ting Liu, Damian Valles. 249-256 [doi]
- Taxonomy Mining from a Smart City CMS using the Multidimensional Knowledge Representation ApproachJohannes Zenkert, Madjid Fathi. 257-261 [doi]
- Hypergraph Transformer for Knowledge TracingXianrun He, Xianghong Lin, Yuan Zhao. 262-268 [doi]
- SE-DO: Navigating the 6G Frontier with Scalable and Efficient DevOps for Intelligent Agents OptimizationPetro Mushidi Tshakwanda, Harsh Kumar, Sisay T. Arzo, Michael Devetsikiotis. 269-277 [doi]
- HIV Progression and Outcome Prediction to Enhance Patient Matching for Clinical TrialsRakeshkumar V. Mahto, Kanika Sood. 278-284 [doi]
- Using Convolutional Neural Network to Predict EURO GamesArisoa S. Randrianasolo. 285-290 [doi]
- Agent Guidance in Autonomous Mobility on Demand Systems: An Approach Utilizing Priority Double Deep-Q-NetworksJiyao Li, Vicki H. Allan. 291-300 [doi]
- Towards an Automatic Ensemble Methodology for Explainable Reinforcement LearningRudy Milani. 301-307 [doi]
- MicroElectrodes for High Density Surface ElectromyographyBrendan P. Beauchamp, Nabeeh Kandalaft, Karl Brakora. 308-311 [doi]
- Myoelectric Controls with Embedded Machine LearningAaron M. Mulder, Nabeeh Kandalaft. 312-315 [doi]
- ChatGPT in Education, Healthcare, and Cybersecurity: Opportunities and ChallengesShafi Parvez Mohammed, Gahangir Hossain. 316-321 [doi]
- Machine Learning Techniques for Non-Intrusive Load Monitoring for Enhanced Energy PredictionsTushar Chugh, Kanishka Tyagi, Rolly Seth. 322-328 [doi]
- Techniques to Detect Fake Profiles on Social Media Using the New Age Algorithms - A SurveyA. K. M. Rubaiyat Reza Habib, Edidiong Elijah Akpan, Bhaskar Ghosh, Indira Kalyan Dutta. 329-335 [doi]
- Efficient Designs for the 8-Bit Approximate Fixed Point MultiplicationKaptan Singh, Sai Varun Puligilla, Harshitha Ramesh, Ankur Lnu, Hayssam El-Razouk. 336-344 [doi]
- A Soulbound Token Certificate Verification System (SBTCert): Design and ImplementationTarun Vihar Tumati, Yun Tian, Xunfei Jiang. 345-350 [doi]
- Recursive Implementation of Voting NetworksBehrooz Parhami. 351-356 [doi]
- Advancements in Secure Computing: Exploring Automated Repair Debugging and Verification Techniques for Hardware DesignAlireza Abolhasani Zeraatkar, Parnian Shabani Kamran, Hussain Al-Asaad. 357-364 [doi]
- State-Based Dynamic Graph with Breadth First Progression For Autonomous RobotsTushar Chugh, Kanishka Tyagi, Pranesh Srinivasan, Jeshwanth Challagundla. 365-369 [doi]
- Towards Distributed Learning to Support Situational Awareness for Robotic Team Augmented Humanitarian Disaster ResponseMark Allison, Michael Farmer, Zheng Song. 370-374 [doi]
- AutoHealth: Advanced LLM-Empowered Wearable Personalized Medical Butler for Parkinson's Disease ManagementLuis Cardenas, Katherine Parajes, Ming Zhu, Shengjie Zhai. 375-379 [doi]
- An Online Supervised Learning Algorithm Based on Spike Train Kernel for Spiking NeuronsLiu Yang, Xianghong Lin, Yuan Zhao, Xiangwen Wang, Xianrun He, Yaohui Zou. 380-386 [doi]
- L-IDS: A Multi-Layered Approach to Ransomware Detection in IoTFarhad Mofidi, Sena Hounsinou, Gedare Bloom. 387-396 [doi]
- Fire Egress Simulations Based on Human Behavioural PatternsGisung Han, Ryan Ficocelli, Andrew J. Park, Eunju Hwang. 397-402 [doi]
- H2 EMS: A Simulation Approach of a Solar-Hydrogen Energy Management SystemSalaki Reynaldo Joshua, Sanguk Park, Kihyeon Kwon. 403-408 [doi]
- MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for BlockchainTariqul Islam 0001, Faisal Haque Bappy, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom. 409-413 [doi]
- Multiple Gain Adaptations for Improved Neural Networks TrainingJeshwanth Challagundla, Kanishka Tyagi, Tushar Chugh, Michael T. Manry. 414-420 [doi]
- Learning Blockchain Technology in High School: Towards Cybersecurity EducationGahangir Hossain, Dedeepya Yarra. 421-427 [doi]
- Exploring Polymorphic Algorithms and Their Use in CryptographyMandeep Singh, Albert Carlson. 428-434 [doi]
- Enhancing Cyber Resilience with AI-Powered Cyber Insurance Risk AssessmentShadi Jawhar, Craig E. Kimble, Jeremy R. Miller, Zeina Bitar. 435-438 [doi]
- Blockchain Technology in the Healthcare Sector: Overview and Security AnalysisNour El Madhoun, Badis Hammi. 439-446 [doi]
- Improving Network Traffic Anomaly Detection through Data Denoising and Unsupervised LearningJames Talbott, Joshua Palicka, Alexander Sheardown, Wan D. Bae, Matthew Horak. 447-453 [doi]
- Towards Design Synthesis from Verbal Conversations in TeamsAlex Doboli. 454-459 [doi]
- Cimalir: Cross-Platform IoT Malware Clustering using Intermediate RepresentationMinhajul Alam Rahat, Vijay Banerjee, Gedare Bloom, Yanyan Zhuang. 460-466 [doi]
- Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device FirmwareAusten Knapp, Emmanuel Wamuo, Minhajul Alam Rahat, Santiago Torres-Arias, Gedare Bloom, Yanyan Zhuang. 467-473 [doi]
- Security threats on Data-Driven Approaches for Luggage ScreeningDebashis Gupta, Aditi Golder, Kishor Datta Gupta, Dipankar Dasgupta, Roy George, Khalil Shujaee. 474-483 [doi]
- Automated Vulnerability Detection in Source Code Using Deep Representation LearningChristoforos Seas, Glenn Fitzpatrick, John A. Hamilton Jr., Martin C. Carlisle. 484-490 [doi]
- Enhancing Wearable ECG Sensors: A Secure, Accurate and Efficient System Architecture for Resource-Constrained ECG MonitoringAdarsha Bhattarai, Dongming Peng, Jason Payne, Hamid Sharif. 491-497 [doi]
- Reducing the Computational Cost of Urban Flood Prediction in Los AngelesLaura Bedoyan, Mansoureh Lord, Adam Kaplan. 498-506 [doi]
- A Framework for Abstractive Summarization of Conversational MeetingsVincent Marklynn, Anjali Sebastian, Yong Long Tan, Wan D. Bae, Shayma Alkobaisi, Sada Narayanappa. 507-512 [doi]
- Geomagnetic Storm Forecasting Using Machine Learning ModelsShree Ram Abayankar Balaji, Prakash Ranganathan. 513-520 [doi]
- CMI: Cluster-Centric Missing Value Imputation with Feature ConsistencyMegha Gupta, Shripal Shah, Mohammad Masum, Sai Chandra Kosaraju. 521-526 [doi]
- Trusting Classifiers with Interpretable Machine Learning Based Feature Selection BackpropagationSaikat Das, Raktim Ranjan Das, Frederick T. Sheldon, Sajjan G. Shiva. 527-533 [doi]
- State of the art: Security Testing of Machine Learning Development SystemsSaikat Das, Bhargavi Krishnamurthy, Raktim Ranjan Das, Sajjan G. Shiva. 534-540 [doi]
- Using Natural Language Processing Tools to Infer Adversary Techniques and Tactics Under the Mitre ATT&CK FrameworkRyan Gabrys, Mark Bilinski, Sunny Fugate, Daniel Silva 0012. 541-547 [doi]
- Can AI Keep You Safe? A Study of Large Language Models for Phishing DetectionRobin Chataut, Prashnna Kumar Gyawali, Yusuf Usman. 548-554 [doi]
- Smart Car Temperature Monitoring System Using SRAM-Based PUF SensorTrevor Ridley, Julius Andrade, Cristian Luna, Hayssam El-Razouk. 555-563 [doi]
- ACPPS: Autonomic Computing based Phishing Protection SystemJordan Mazur, Christopher Rouff, Ali Tekeoglu. 564-569 [doi]
- A Dyad-Based Mobile System to Support Older Adults and Informal CaregiversTarek El Salti, Edward R. Sykes, Jordan Scrivo, Brandon Plaza, Vladislav Mun. 570-576 [doi]
- Rotational Flying Station for Wireless Access in Large Disaster AreaHasan Imran, Xingya Liu. 577-582 [doi]
- Defending Against Wormhole Attacks in Wireless Networks Using the Twofish Algorithm: A Performance AnalysisPramod Singh Rathore, Mrinal Kanti Sarkar. 583-588 [doi]
- An Innovative Method for Securing QR Codes against Counterfeits in Supply Chain ManagementRichard Wu, Nicole Liu, Grace Peng, Adarsha Bhattarai, Dongming Peng. 589-596 [doi]
- A Genetic Algorithm Approach for A Broadband Reflector DesignTareque Abu Abdullah, Hasan Md Imran, Suriya Islam Chowdhury, Mohd Ariful Haque. 597-602 [doi]
- Exploring the Impact of Cloud Computing and Edge Computing on Resource Consumption for Mobile Devices with Generative Artificial Intelligence APIsAndrew Baynum, Wei Hao. 603-609 [doi]
- A Conceptual Software Framework to Monitor Harmful Algal Blooms (HABs) in LakesMeera Gopinath Sujatha, Hassan Reza, Prakash Ranganathan. 610-619 [doi]
- Introduction to Inline-Services: A Seamless Approach to Microservices DevelopmentFriban Almeida. 620-625 [doi]
- Spatial Variability Learning of Biomechanical Dynamics in Daily LivesMing Liu, Qingxue Zhang. 626-629 [doi]
- Empirical Characterization of Ookla's Speed Test Platform: Analyzing Server Deployment, Policy Impact, and User CoverageZesen Zhang, Jiting Shen, Ricky K. P. Mok. 630-636 [doi]
- Characteristic Analysis of Upper Bound Call Blocking Probability of Emergency CAC for Three Types of CallsSota Narikiyo, Sumiko Miyata, Ken-ichi Baba, Katsunori Yamaoka. 637-639 [doi]
- Optimizing Post Deployment Maintainance at Nodal Level for Macroscale Wireless Sensor NetworkSrihari Koripalli, Drake Sheela, Nan Wang. 640-645 [doi]
- Use of BIM Technology For Augmented Reality In BuildingsAracely Marilu Pacheco Mercado, Cynthia Janeth Cerron-Mercado, Fernando Reymundo Tapara Giron, Augusto Alberto Herrera-Parraguez. 646-655 [doi]
- Efficient Fourth-Order Buck Converter Design for Hybrid Electric Vehicle Power Systems with State Space Average Modeling and ControlJaldu Asish, Megha T. S, N. Laqueta, Rashmi Seethur. 656-661 [doi]
- CNN-based Autoencoder and Post-Training Quantization for On-Device Anomaly Detection of Cartesian Coordinate RobotsHyuntae Cho. 662-666 [doi]
- Rigid pavement: compressive strength, state of preservation and sampling automationAlbert Jorddy Valenzuela-Inga, Juan Gabriel Benito-Zuñiga, Benjamin De La Cruz Taipe, Abel Max Julcarima Espiritu, Romel Moisés Olivera-Pérez, Deyvid Froilán Matamoros-Paitán, Heydi Karina Hinostroza-Maravi. 667-673 [doi]
- Predicting Travel Time in Complex Road Structures using Deep LearningVignaan Vardhan Nampalli, Charan Gudla, Md. Shohel Rana. 674-681 [doi]
- Enhancing Security and Privacy in Cyber-Physical Systems: Challenges and SolutionsManvendra Sharma. 682-686 [doi]
- Enhancing Cloud-Based Application Component Placement with AI-Driven OperationsEfterpi Paraskevoulakou, Jean-Didier Totow Tom-Ata, Chrysostomos Symvoulidis, Dimosthenis Kyriazis. 687-694 [doi]
- SIS-IDAI System in the Performance of Vehicle Counting in Different Road Scenarios in the City of HuancayoAlbert Jorddy Valenzuela-Inga, Luis Fernando Alania-Borja, Rosali Ramos-Rojas. 695-700 [doi]
- Data-Driven Approach to Identify Connectivity and Bus stop Importance in Transit NetworkShivanjali Khare, Nahom H. Demoz, Medha Kanu Baniya. 701-707 [doi]
- Learning Cost-Adjusted Predictive Models with Margin-Based FrameworkNaved Anwar, Moshe Battula, Jaismeen Kaur, Saumya Pailwan. 708-712 [doi]
- RTL to GDS Implementation and Verification of UART using UVM and OpenROADPurav Bhatt, Dharmik Joshi, Shrikant Jadhav. 713-720 [doi]
- Deepfakes - Reality Under Threat?Md. Shohel Rana, Md Solaiman, Charan Gudla, Md Fahimuzzman Sohan. 721-727 [doi]
- A novel 10T SRAM bit-cell with high static noise margin and low power consumption for binary In-Memory ComputingHossein Khosravi, Ricardo Carmona-Galán, Jorge Fernández-Berni, Nabeeh Kandalaft. 728-733 [doi]
- Analysis of Serious Games for Nutrition Using NLP TechniquesVictor A. Okpanachi, Ifeoma Adaji. 734-743 [doi]
- Utilizing ChatGPT to Improve Quantum AlgorithmsChuck Easttom. 744-749 [doi]