Abstract is missing.
- E-Banking SAF: A TOGAF-NIST Aligned Security Architecture Framework for E-Banking SystemsTee Hean Tan, Too Khong Tan. 1-6 [doi]
- Visualized Malware Images using Hybrid Ensemble Deep Transfer LearningAbdullah Sheneamer. 7-12 [doi]
- Enhancing Named Entity Recognition in Safety Hazard Analysis through GBD and LLMsHaoling Dong, Bin Wu. 13-19 [doi]
- Analysis of the Echo Chamber Caused by Unexpected OpinionsAkira Nakagawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga. 20-26 [doi]
- Defining Model-Driven Safety-Critical Software Engineering, with International StandardEmanuel S. Grant. 27-33 [doi]
- A Brief Review on Recent Advances in Haptic Technology for Human-Computer Interaction: Force, Tactile, and Surface Haptic FeedbackNazih Mallouk, Majid Roshanfar, Pedram Fekri, Javad Dargahi. 34-39 [doi]
- A Disambiguation of Security-based Software TestingRobert Dilworth, Charan Gudla, Md. Shohel Rana, Feroz Ahmed. 40-45 [doi]
- Non-Intrusive Load Monitoring Based Smart Energy Management System For Smart BuildingsMuhammad Jawad 0001, Noman Shabbir, Roya Ahmadiahangar, Argo Rosin, Taha Khaleel, Wisha Tahir. 46-50 [doi]
- A New Boolean Matrix Factorization Algorithm Based on Cardano's MethodHan Xiao, Tsuyoshi Migita, Norikazu Takahashi. 51-56 [doi]
- Multi-attribute and Multi-label Deep Metric Learning via Pair-based and Proxy-based LossesShozo Saeki, Minoru Kawahara, Hirohisa Aman. 57-63 [doi]
- Perspective Indicators for Service Orchestration in Zero-touch network and Service Management ContextSamuel Kopp, Regina Melo Silveira. 64-69 [doi]
- Security Monitoring for VANETs Using Machine LearningNathan Pape, Christopher Mansour. 70-74 [doi]
- Advanced Deepfake Detection using Machine Learning Algorithms: A Statistical Analysis and Performance ComparisonMd. Shohel Rana, Andrew H. Sung. 75-81 [doi]
- Machine Learning Approaches for Credit Card Fraud Detection: A Comparative Analysis and the Promise of 1D Convolutional Neural NetworksBalachandar Paulraj. 82-92 [doi]
- Performance Analysis of EfficientNet for Rice Grain Quality Control-An Evaluation against YOLOv7 and YOLOv8Gilbert G. Yadao, Omar Mukhtar Y. Julkipli, Cyrel Ontimare Manlises. 93-98 [doi]
- Optimal Scheduling for the Performance Optimization of SpMV Computation using Machine Learning TechniquesFida Ullah, Muhammad Ahmed, Muhammad Tayyab Zamir, Muhammad Arif 0014, E. Felipe-Riverón, Alexander F. Gelbukh. 99-104 [doi]
- An Evaluation of Machine Learning Models for Analyzing Disaster-Related TweetsSangeeta Kumawat, Gideon Sodipo, Deepak Palei, Safa Shubbar, Kambiz Ghazinour. 105-110 [doi]
- Comparison of Convolutional Neural Networks in SARS-CoV-2 IdentificationKhokhoni Innocentia Mpho Ramaphosa, Tranos Zuva, Temidayo Otunniyi. 111-116 [doi]
- Improved Conditionally Optimal DAG Task Parallelization for Global EDFWonsuk Jang, Youngeun Cho, Chang-Gun Lee. 117-125 [doi]
- Beyond Noise: Incorporating Pre-Trained Contractive Autoencoders for Enhanced GAN-based Tabular Data CreationHesam Fallahian, Mohsen Dorodchi, Kyle Kreth. 126-132 [doi]
- ComFaaS Distributed: Edge Computing with Function-as-a-Service in Parallel Cloud EnvironmentsJaden Jinu Lee, Judah Nava, Hanku Lee. 133-138 [doi]
- A Distributed Training Approach on Email Spam Classification using DistilBERTDionis A. Padilla, Benjamin David P. Fernandez, Vance I. Del Rosario. 139-144 [doi]
- An Approach to Enhance the Equilibrium of Search Capabilities for Multi-objective Evolutionary Algorithms Based on Differential EvolutionMinh Tran Binh, Long Nguyen. 145-150 [doi]
- A Conceptual Model Based Design Methodology for MongoDB DatabasesWai Yin Mok. 151-159 [doi]
- Multimedia Data Sharing with the NAMI Short-range Information Sharing SystemTadashi Ogino. 160-165 [doi]
- Optimizing Neuro-Fuzzy and Colonial Competition Algorithms for Skin Cancer Diagnosis in Dermatoscopic ImagesHamideh Khaleghpour, Brett A. McKinney. 166-172 [doi]
- Expiration Identification of Canned Goods using Convolutional Neural NetworkCyrel Ontimare Manlises, Dionis A. Padilla, Joan B. Santos, Patricia A. Adviento. 173-177 [doi]
- Application and research of clothing fabric identification based on cloud, edge and end intellisenseGuorong Qiao, Guorong Qiao, Jinrong Chen. 178-187 [doi]
- Tracking of Human Motion Between Optical Flow Methods Based on Processing TimeKarla Veronica Sevilla, Karl Leyven Leonida, Cyrel Ontimare Manlises. 188-192 [doi]
- Efficient Feature Extraction for Image Analysis through Adaptive Caching in Vector DatabasesSolmaz Seyed Monir, Dongfang Zhao 0001. 193-198 [doi]
- Cat Eye Disease Classifier Using YOLOv5Thañel Daevid D. Tuason, Jules Darius C. Garcia, Cyrel Ontimare Manlises. 199-203 [doi]
- Hollowed-Out Icon Colorization with Controllable Diffusion ModelKoki Miyauchi, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga. 204-210 [doi]
- Dried Water Lily Stem Validation for Weaving Fiber Production using K-Nearest Neighbors (K-NN) Classification AlgorithmRichard Añonuevo Ramos, Jocelyn Flores Villaverde. 211-215 [doi]
- Service Satisfaction Evaluation from Gaits Using Local Low-level and Global Co-occurrence FeaturesHao Li, Lulu Huang, Wenzhuo Cheng, Xiaoyi Wang, Chao Wu 0001. 216-222 [doi]
- An Electronic Nose Approach in Identifying Ripe Tomato Fruit Using LeNet-5 StructureDionis A. Padilla, Marie Krystine D. Anticuando, Claudee Khiarra R. Directo. 223-227 [doi]
- A Lightweight Spatio-Color Scrambled EtC System for JPEG XS StandardTakayuki Nakachi, Hiroyuki Kimiyama, Mitsuru Maruyama. 228-232 [doi]
- Detection of Shell Waste on Sea Sand Using YOLOv5 ModelDionis A. Padilla, Ezekiel J. Mariano, Christopher Nilo A. Caysido. 233-237 [doi]
- Enhancing Global Security: A Robust CNN Model for Deepfake Video DetectionMd Solaiman, Md. Shohel Rana. 238-243 [doi]
- Chinese Native Dog Breed Classification Method based on Improved ResNetXinhua Zhang, Chenwang Shen, Jiaxi Xu, Fenghao Yuan, Chaofan Li, Xu Liu 0006. 244-249 [doi]
- Ultrasonic testing signal image processing based on improved set empirical mode decompositionSiqi Zhao, Yuying Peng. 250-254 [doi]
- Understanding Accelerated Graph Clustering via Local GroupingChengliang Yang. 255-258 [doi]
- AAANet: Segmentation network with Atrous Axial Attention Spatial Pyramid PoolingZikang Gong, Mingyuan Xi. 259-264 [doi]
- Defect Detection and Classification of Soybean Using Convolutional Neural NetworkFritz Carvey A. Bascara, Analyn N. Yumang. 265-270 [doi]
- The Effects of Dropout and Weight Initialization on Human Face Classification Accuracy Using Multiple-agent Generative Adversarial NetworkMahmood H. B. Alhlffee, Riyad Ali Ahmad Abuirbaiha. 271-276 [doi]
- The Effect of Data Augmentation and Padding of the Image Dataset on Detection of Black Sigatoka Disease on Banana Leaves Using ShuffleNet V2 CNN ArchitectureJonathan M. Baguisi, Baird Rouan S. Buenaventura, Analyn N. Yumang. 277-282 [doi]
- Object Recognition Interface in Vehicles Using Google MLAllan Paul A. Umotoy, Analyn N. Yumang. 283-288 [doi]
- Enhancing Clickbait Detection with Cross-Modal Topic Modeling in Social NetworksSmita Ghosh, Diptaraj Sen, Sneha Ghosh. 289-294 [doi]
- Deeper Leakage from Gradients through Membership Inference AttackBiying Fang, Tao Zhang. 295-300 [doi]
- Diagnosability of the lexicographic product of cycles and paths under PMC ModelBu Chen, Feng Li. 301-308 [doi]
- A Robust and Efficient Risk Assessment Framework for Multi-Step AttacksHuimei Liao, Siyuan Leng, Junhai Yang, Jinbo Xu, Junhao Zhang, Jinling Tang. 309-314 [doi]
- The Novel Asset Management Algorithm Based on Special Consensus Mechanism of Block ChainHaitao Liu, Lingli Lv, Yi Bao. 315-319 [doi]
- Web application based on the Fuzzy Analytic Hierarchy Process (FAHP) to optimize the selection of suppliersRonnie Rantes, Piero Acosta, Pedro Castañeda. 320-325 [doi]
- Mosquinator: A Community-Based Mobile and Web Application Framework for combating Dengue and providing Awareness for Residents of Pasig CityRobert Jay C. Cruz, Rene Victor A. San Juan, Ralph Christian S. Cristobal, Lee Ann D. Lo, Leonila B. Valdez. 326-331 [doi]
- Improving Source Code with Assistance from AI - A Pilot Case Study with ChatGPTSteven McDaniel, Minhaz F. Zibran. 332-337 [doi]
- PM4WireArt: A Scriptable Parametric Modeling Interface for Conceptual Wire Art Design Using PM4VRWanwan Li. 338-343 [doi]
- Design of a Mobile Application for Nearby and On-Demand Pet-Sitting ServicesEric Blancaflor, Gian Carlo A. Banao. 344-349 [doi]
- EndToEndML: An Open-Source End-to-End Pipeline for Machine Learning ApplicationsNisha Pillai, Athish Ram Das, Moses Ayoola, Ganga Gireesan, Bindu Nanduri, Mahalingam Ramkumar. 350-358 [doi]
- HARIBON FOUNDATION LIPAD PH: An Android-based Mobile Application Framework featuring Threatened Air Species in the PhilippinesSharon Guzman, Rod Justine Estandian, Ryan Llarena, Joy Fortunado, Allen Daria, Ryan Richard H. Guadaña. 359-364 [doi]
- Contingency Ranking and Screening of an IEEE Bus-6 Case System with Distributed GenerationJohn Christopher Adina, John Mark Gonzales, Henar Mike Canilang, Deo Vincent Valera, Michael C. Pacis. 365-368 [doi]
- Grid Tagging Schemes as Semantic SegmentationZhengyu Qi. 369-376 [doi]
- Enhancing Physiological Consistency in Dynamic PET/CT for Hepatocellular Carcinoma through Prior Information and NSGA-IIIYiwei Xiong, SiMing Li, Jianfeng He, Shaobo Wang. 377-381 [doi]
- Comparative Analysis of EmoRoBERTa and Distilled Zero-shot Student Model for Emotion Detection in TextsMary Joy P. Canon, Lany L. Maceda, Christian Y. Sy, Nancy M. Flores. 382-388 [doi]
- Predictive Analytics for Digital Twins: The Concept and Systems ApplicationsNader Mohamed, Jameela Al-Jaroodi. 389-393 [doi]
- Learn to Prompt: Soft-Prompting Adaptive Attention for Image CaptioningMingzhang Cui, Mingyue Cui. 394-401 [doi]
- Energy Generation from Rotating BMX Wheels Using Triboelectric Nanogenerator (TENG) with IoT MonitoringD. P. Castillo, T. B. Perido, J. G. L. Sun, Michael C. Pacis. 402-405 [doi]
- Enhancing Energy Efficiency in Telehealth IoT through Multi-Objective OptimizationYunyong Guo, Sudhakar Ganti, Bryan Guo. 406-412 [doi]
- Review of Security Threats and Attacks on IoT-based New Age EcosystemsAkashdeep Bhardwaj, Shawon Rahman. 413-420 [doi]
- Thingspeak Based Monitoring IoT System for Hydroponics SystemLovina Siechrist T. Agbayani, Jocelyn Flores Villaverde. 421-426 [doi]
- Intelligent Medication Compliance System for Patients Using IoTSuja A. Alex, Ramin Ranjbarzadeh, Gabriel Caumo Vaz, Gabriel Gomes de Oliveira, Angela Maria Alves. 427-431 [doi]
- Smart TERRY: an IOT-based Autonomous Smart Terrarium Management System for Bearded Dragon Pet EnthusiastsWilliam P. Rey, Albert C. Villaluz, Kieth Wilhelm Jan Dugang Rey. 432-437 [doi]
- Detection of Abnormal Respirations Considering the Occurrence Timing of Adventitious SoundsMasaru Yamashita. 438-441 [doi]
- Stealthy False Data Injection Attack Using Improved Singular Value Decomposition in Smart GridLiqun Yang, Chunan Li, Chaoren Wei, Jian Yang 0030, Gang Qu, Liang Zhang, Yipeng Zhang, Tongliang Li. 442-447 [doi]
- Router Monitoring System with a Function for Estimating Network Topology in Network Construction ExercisesYuichiro Tateiwa. 448-452 [doi]
- Advancing MAISON: Integrating Deep Learning and Social Dynamics in Cyberbullying Detection and PreventionMehdi Ghayoumi, Kambiz Ghazinour. 453-461 [doi]
- Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing ProtocolsSeiya Ookura, Hideharu Kojima, Naoto Yanai. 462-467 [doi]
- mpiPython: Extensions of Collective OperationsJudah Nava, Jaden Jinu Lee, Hanku Lee. 468-473 [doi]
- PASTA Threat Modeling for Vehicular Networks SecurityNathan Pape, Christopher Mansour. 474-478 [doi]
- Development of Dialogue Feature between Participants and ChatGPT in Network Security Exercise SystemYuichiro Tateiwa. 479-484 [doi]
- MICORD-IDS: A Hybrid Learning System for Intrusion Detection System for the Internet of VehiclesSunil Kaushik, Akashdeep Bhardwaj, Shawon S. M. Rahman. 485-492 [doi]
- Interactive construction of personalized fashion capsule wardrobes with alternative item recommendationsYuta Tanaka, Tomonobu Ozaki. 493-498 [doi]
- Identification of Various Genus Mentha L. with Electronic Nose Using Fuzzy Logic AlgorithmPatrick Jayson M. Arriola, Elijah G. Armada, Cyrel Ontimare Manlises. 499-503 [doi]
- Smart Traffic Management using Convolutional Neural NetworksJohn Clement Suladay Escobanez, Mark James G. Cayabyab, Julie Anne Angeles-Crystal. 504-508 [doi]
- Identification of obtaining incorrect values from the GSR sensor during skin resistance measurementsStefan Koprda, Martin Magdin, Matús Sásik, Zoltán Balogh 0002, Kristián Fodor, György Molnár. 509-513 [doi]
- Analysis of Conditional Image Generation Methods Using Color Palettes in Animal Personification TaskJianglin Xu, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga. 514-521 [doi]
- Indoor Tracker and Behavior Abnormality Detection Using Time Series Anomaly DetectionChristian G. Docdocil, Horlanz Myer I. Espinosa, Jocelyn Flores Villaverde. 522-526 [doi]
- Assessing ChatGPT's Capability to Generate Course Learning OutcomesOmaima Almatrafi. 527-531 [doi]
- Explainable AI: The Quest for Transparency in Business and BeyondHanna DeSimone, Maikel León Espinosa. 532-538 [doi]
- System to optimize the process of booking medical appointments for people with upper extremity disabilitiesGino P. Monrroy, Pedro S. Castaneda. 539-543 [doi]
- The Belt and Road Initiative and the AI-driven Animation innovationMeili Zhu. 544-548 [doi]
- Performance Measurement in Optimizing Customer Relationship Management Systems through Robotic Process Automation with FlaUIWei En Tan, Peter ChunYu Yau, Sye Loong Keoh, Ejoe Tso, Dennis Wong, Lai Meng Tang. 549-556 [doi]
- Voltage Stability Analysis of Hybrid Distributed Generators for Power Distribution Networks using Continuous Power Flow AlgorithmRojanson C. Mintalar, Japhet P. Moreno, Franco R. Rosete, John Rey C. Trinidad, Michael C. Pacis. 557-560 [doi]