Abstract is missing.
- A Literature Review on Real-Time Image Classification for Dragonfly Species Using TensorFlow.js and Biodiversity MonitoringOrion Liçi, Inva Bilo, Karafil Kareçi, Ana Ktona. 1-9 [doi]
- AI-Driven Defense-in-Depth: A Systematic Review of SOC Maturity Models and DDoS MitigationGeorge Antoniou. 10-17 [doi]
- AI-Driven Real-Time Distress Detection Through Speech Recognition for Emergency Response SystemsMalvina Halilaj, Elektra Myrto, Aldo Franco Dragoni. 18-25 [doi]
- Adaptive Reliability-Based Fuzzy Clustering with Modified Objective FunctionErind Bedalli, Shkelqim Hajrulla. 26-34 [doi]
- Breaking Barriers with Multilingual AI in Translation ClassroomsElnura Usupova. 35-45 [doi]
- Content-Page View RelationshipMayank Gupta, Shivesh Gupta. 46-57 [doi]
- Cryptographic Defense Against Quantum Computer Attacks: A Scoping ReviewVullnet Gërvalla, Eliot Bytyçi. 58-67 [doi]
- Elevating Semantic Exploration: A Novel Approach Utilizing Distributed RepositoriesValerio Bellandi. 68-78 [doi]
- Exploring Research Collaboration through Network AnalysisAlma Braimllari. 79-88 [doi]
- Fuzzy Density-Based Clustering in Dense Datasets: A Modified DBSCAN AlgorithmErind Bedalli, Rexhep Rada, Luan Sinanaj. 89-98 [doi]
- GNN for asynchronous Spatio-Temporal Data ClassificationMatthis Leicht, Nadia Burkart, Rashmi Ambale Gopalakrishna, Felix Bächle. 99-106 [doi]
- Invoice and Receipt Optical Character Recognition: Review on Current Methods and Future TrendsAlbana Rexhepi, Erijon Hasi, Art Haxholli, Eliot Bytyçi. 107-116 [doi]
- Measurement System Analysis of IoT Devices for Illuminance MonitoringLaimonas Kairiukstis, Ilma Lili, Anxhela Kosta, Ejona Peqini, Jonalda Gjoka, Kamile Kairiukstyte. 117-126 [doi]
- Optimization of the Book Scanning Problem via Iterated Local Search and Genetic AlgorithmsDriton Alija, Meriton Kryeziu, Endrit Hoda, Lirim Islami, Lorik Mustafa, Yll Berisha, Kadri Sylejmani, Arben Ahmeti, Labeat Arbneshi. 127-135 [doi]
- Simplify the Creation of Remote Controls and Monitoring Interfaces for Microcontrollers and Automation Systems Using IoT Cloud ServicesFilippos Kladouchas, Nikitas Karanikolas. 136-144 [doi]
- Classification of Albanian Social Media Posts into Toskë and Gegë DialectsTrime Ismajli, Jetmir Gjoni, Enda Alidema, Eliot Bytyçi. 145-151 [doi]
- Exploiting Human Vulnerabilities: A Practical Analysis of Social Engineering Attacks and CountermeasuresArdi Benusi, Geri Selgjekaj. 152-159 [doi]
- Indoor Navigation: A Comparative Study of Traditional and Machine Learning AlgorithmsErisa Bekteshi, Claudio Pascarelli. 160-167 [doi]
- Review of AI Applications in Oncology: Current Tools, Challenges, and Opportunities for Clinical Decision SupportElda Xhumari, Enrik Dollaj. 168-174 [doi]
- Simulating Car-Sharing Demand: A Data-Driven Approach Using Probability DistributionsShkelqim Hajrulla, Ejsi Veshaj, Leonard Bezati, Robert Kosova. 175-179 [doi]
- Structured Text Extraction from ID DocumentsOlti Qirici. 180-185 [doi]