Abstract is missing.
- A Metaprogramming Algorithm to Simplify the Coding Syntax of Data Analysis MethodsDavid Shilane. 1-5 [doi]
- Exploring Accelerometer Sensors for Optimized Smart Shoe-Based Fall DetectionMd Shohanoor Rahman, Ali Nikoukar, Mesut Günes, Behnam Dezfouli. 1-6 [doi]
- Deep Data-driven RUL Prediction for Optimizing Safety-constrained CBM Strategies in Plant ModernizationYi Huang, Dongxue Zhao, Bin Xie. 14-23 [doi]
- Machine Learning Methods to Predict Telehealth UtilizationDavid Shilane, Ting'An Heidi Lu, Zhenyi Zheng. 24-27 [doi]
- Image Augmentation with Convolutional Neural NetworksMichael Curry, Min Chen. 28-37 [doi]
- Signal Attenuation through Foliage Estimator (SAFE)Mathieu Châteauvert, Jonathan Ethier, Pierre Bouchard. 38-41 [doi]
- Stress Testing for Resilience of Semiconductor Supply ChainsZachary A. Collier, Davis C. Loose, Elvie Sellers, Thomas L. Polmateer, Madhur Behl, Igor Linkov, James H. Lambert. 42-49 [doi]
- Do API Migrations revert commits - A Preliminary InvestigationOmar Meqdadi, Nazim Choudhury. 50-56 [doi]
- Cloud-Based Human Emotion Classification Model from EEG SignalsSuhaima Jamal, Meenalosini Vimal Cruz, Jongyeop Kim. 57-64 [doi]
- Internet-of-Things Augmentation of Public Access Naloxone Containers to Establish a Distributed Network for Resource Monitoring and Utilization Research (NaloxBox+)Joanne Z. Liu, Frederick A. Varone, John K. Volpe, Leo Kobayashi, Geoffrey A. Capraro. 65-71 [doi]
- Dash: A Low Code Development Platform for AI Applications in IndustryYifan Wang, Weijia Song, Yuting Yang, Charif Mahmoudi, Shashank Shekhar 0001, Kenneth P. Birman. 72-81 [doi]
- Exploring Solutions for Container Image SecurityFrank Campo, Howe Wang, Joel Coffman. 82-88 [doi]
- Assessment of Visual Patient Re-Identification in a Live Emergency Department Waiting RoomHaibo Wang, Leo Kobayashi, Geoffrey A. Capraro, Kees van Zon, Mukul Rocque, Sophia L. Bonenfant, Mark G. Brinkman, Mads P. Cosgriff, Samuel B. Craft, Rachel S. Fried, Abbey Haynes, Daniel J. Higgins, Hyein S. Lee, Meredith Ringel Morris, Christine Ortiz, Alana Oster, Evaniz Suarez, Jessica L. Tremblay, Derek Merck, Ihor Kirenko. 89-96 [doi]
- Mappin: A Web Native Browse Tool for the NASA JPL ITS_LIVE Project's Ice Velocity DatasetJacob R. Fahnestock, Douglas E. Dow. 97-100 [doi]
- Review of Digitalization using Big Data Maturity Models: The Case of American Automotive SMEsDharmender Salian, Raed Sbeit. 101-106 [doi]
- Crime Reach Analysis Within the Environmental BackclothFinian Lugtigheid, Andrew J. Park, Valerie Spicer, Stefano Z. Stamato, Vincent T. Nguyen. 107-113 [doi]
- Efficient Cloud Pipelines for Neural Radiance FieldsDerek Jacoby, Donglin Xu, Weder Ribas, Minyi Xu, Ting Liu, Vishwanath Jeyaraman, Mengdi Wei, Emma De Blois, Yvonne Coady. 114-119 [doi]
- Secure, Fast, and Loss-Tolerant Communication with Hill Cipher and Network CodingHiroshi Nishida. 120-126 [doi]
- Congestion-Aware Routing in Software Defined Vehicular NetworksM. Nikhita, Rajasekar Mohan. 127-133 [doi]
- Comparison of Video Photoplethysmography, Video Motion Analysis, and Passive Infrared Thermography against Traditional Contact Methods for Acquiring Vital Signs in Emergency Department PopulationsLeo Kobayashi, Carlin C. Chuck Scb, Chris K. Kim, Katherine Luchette, Alana Oster, Derek Merck, Ihor Kirenko, Kees van Zon, Marek Bartula, Mukul Rocque, Haibo Wang, Canberk Baci, Benoit Balmaekers, Rene Derkx, Geoffrey A. Capraro. 134-141 [doi]
- Drone for Object TrackingRyan Walczyk, Dana Moore, David Zhagui, Peter Burgos, Supriyo Karmakar. 142-147 [doi]
- Effective Crowd Management in a T-IntersectionRyan Ficocelli, Andrew J. Park, Lee D. Patterson, Frank Dodich, Valerie Spicer, Herbert H. Tsang. 148-154 [doi]
- Informative Path Planning Algorithm for the Exploration of Unknown 2D EnvironmentsGeronimo Macias, Kooktae Lee. 155-162 [doi]
- P4Chain: A Multichain Approach for Real-Time Anomaly Traffic Detection in P4 NetworkOluwaseyi Ajayi, Temidayo Akinyemi, Tarek N. Saadawi. 163-170 [doi]
- User Profiling Attack Using Windows Registry DataEdward L. Amoruso, Cliff C. Zou, Richard Leinecker. 171-181 [doi]
- Local (Per-Input) Robustness Based Guided Adversarial training of Deep Neural NetworksAbdul-Rauf Nuhu, Mahmoud Nabil 0001, Yonas Ayalew, Vahid Hemmati, Abdollah Homaifar, Edward W. Tunstel. 182-191 [doi]
- Defining Metrics for Comparing Threat Intelligence Solutions Through the Lens of the AnalystAlexander Plaza, Thaier Hayajneh. 192-199 [doi]
- DT4I4-Secure: Digital Twin Framework for Industry 4.0 Systems SecurityYu-Zheng Lin, Sicong Shao, Md Habibor Rahman, Mohammed Shafae, Pratik Satam. 200-209 [doi]
- Secure Data Provenance for Internet of Vehicles with Verifiable CredentialsAnuj Nepal, Robin Doss, Frank Jiang 0001. 210-218 [doi]
- Signals of Opportunity: Spoof Detection with Low-Cost Hardware and Edge DevicesPeter Toth, Thomas A. Babbitt, Timothy Graziano. 219-223 [doi]
- Enhancing IoT Security and User Experience: Leveraging SGIoT-SURE for Effective Security ImplementationsShubhavi Arya, Saatvik Arya, Minakshi Arya, Jaibir Singh Arya. 224-229 [doi]
- Enhancing Scalability and Reliability in Semi-Decentralized Federated Learning With Blockchain: Trust Penalization and Asynchronous FunctionalityAjay Kumar Shrestha, Faijan Ahamad Khan, Mohammed Afaan Shaikh, Amir Jaberzadeh, Jason Geng. 230-236 [doi]
- Cybersecurity Challenges and Solutions in IoT-based Precision Farming SystemsShree Ram Abayankar Balaji, Sriram Prabhakara Rao, Prakash Ranganathan. 237-246 [doi]
- Automated Railway Crossing System: A Secure and Resilient ApproachAditi Golder, Debashis Gupta, Saumendu Roy, Md. Abdullah Al Ahasan, Mohd Ariful Haque. 247-253 [doi]
- Investigating Drone Data Recovery Beyond the Obvious Using Digital ForensicsSmit Chandrakant Nayak, Bharath K. Samanthula, Vaibhavi Tiwari. 254-260 [doi]
- Development of Trustable Deep Learning Model in Remote Sensing through Explainable-AI Method SelectionSumaiya Tasneem, Kazi Aminul Islam. 261-267 [doi]
- GSM Based Home Security Alarm System Using Arduino Using Mobile CallAditi Golder, Debashis Gupta, Saumendu Roy, Md. Abdullah Al Ahasan, Mohd Ariful Haque. 268-274 [doi]
- An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained EnvironmentsSyed Rizvi, Mark Scanlon, Jimmy McGibney, John Sheppard 0002. 275-282 [doi]
- Deep Fake and Digital ForensicsHamed Alshammari, Khaled Elleithy. 283-288 [doi]
- Performance and Energy Evaluation of Lightweight Cryptography for Small IoT DevicesDavid Weng. 289-295 [doi]
- Federated Semi-Supervised Driver Behavior ClassificationDarren De Guzman, Alexander C. Loui. 302-309 [doi]
- WeldMon: A Cost-effective Ultrasonic Welding Machine Condition Monitoring SystemBeitong Tian, Ahmadreza Eslaminia, Kuan-Chieh Lu, Yaohui Wang, Chenhui Shao, Klara Nahrstedt. 310-319 [doi]
- 3DFusion, A real-time 3D object reconstruction pipeline based on streamed instance segmented dataXi Sun, Derek Jacoby, Yvonne Coady. 320-328 [doi]
- Low Power Internet-of-Things Sensing Platform for Environment MonitoringColin Watson, Gbadebo Adeniyi, Shrikant S. Jadhav, Youngsoo Kim. 329-332 [doi]
- An Energy-Efficient TDMA Algorithm for Energy Harvesting Wireless Sensor NetworksRobert J. Hayek, Ahmed Ammar. 333-338 [doi]
- Performance Analysis of SVM-Based DOA Estimation for Uniform Linear ArraysShowrov Rahman, Yashaswini Mandalam, Kaushallya Adhikari. 339-345 [doi]
- BioFi: Enabling Sustainable IoT Connectivity with BioFibre-Based Wireless Signal EnhancerVijay A. Kanade. 346-351 [doi]
- Deep Reinforcement Learning Based Energy Management Strategy in Fuel Cell Range Extender BusesCarolin Junk, David Kraus, Eric Sax. 352-357 [doi]
- Machine-Learning Assisted Segmentation to Assess the Outcomes of Tissue Ablation with Nanosecond PulsesMohammad Shahab Uddin, Vincent Yi, Hongfang Zhang, Shu Xiao. 358-363 [doi]
- Branch Prediction in CPU PipeliningIan Healy, Peter Giordano, Wafa Elmannai. 364-368 [doi]
- Heart Rate Monitoring Using Infrared ImagingAref Smiley, Joseph Finkelstein. 369-372 [doi]
- Convolutional Neural Network-Based Regression for Direction of Arrival EstimationChristopher J. Bell, Kaushallya Adhikari, Lauren A. Freeman. 373-379 [doi]
- Neural network for improve ORB-SLAM2 on XZ planeDavid Lazaro-Mata, Joel Artemio Morales-Viscaya, José Eleazar Peralta-López, Juan Carlos Gómez-Cortés, José Alfredo Padilla-Medina, Juan J. Martinez-Nolasco, Alejandro Israel Barranco Gutiérrez. 380-386 [doi]
- Quantifying Repetition in Symbolic Music using Lempel-Ziv CompressionAnton Chen, Ross Greer. 387-393 [doi]
- Assessment and Detection of Electrical Faults Using Deep Learning AlgorithmsK. Naga Sujatha, R. Durga Rao, C. Radhacharan. 394-398 [doi]
- Efficient Quantization and Hardware Implementation of AlexNet on Resource-limited FPGAsEric Rex, Xiaofang Wang. 399-406 [doi]
- Identification of Cyanobacteria for Harmful Algal Blooms Research Using the YOLO FrameworkBenjamin Li, Karen Serrano, Melissa Mazzaro, Meiyin Wu, Weitian Wang, Michelle Zhu. 407-415 [doi]
- Regression Analysis for Prediction of Exercise Exertion Levels Using Physiological DataAref Smiley, Joseph Finkelstein. 416-419 [doi]
- Advancing Connectomics: High-Precision Neural Structure Segmentation Using U-Net-Based ModelAnindita Das Bhattacharjee, Debi Majumdar, Snehil Dey, Srijita Sarkar. 420-426 [doi]
- Retrieval Functionality for Robot to Assist Mobility Challenged IndividualsJesse H. Khoury, Dylan Wang, William Long, Douglas E. Dow. 427-433 [doi]
- A Comparative Study between Time-Domain Symmetrical Components Extraction Method and Proportional-Resonant Control Method under Unbalanced Grid Voltages ConditionsMohammad Alathamneh, Haneen Ghanayem, R. M. Nelms. 434-439 [doi]
- Adaptive PIR Current Controllers for Torque Ripple Reduction of PMSM using Decoupled Speed and Flux ControlHaneen Ghanayem, Mohammad Alathamneh, R. M. Nelms. 440-444 [doi]
- Accelerating FPGA Implementation of Neural Network Controllers via 32-bit Fixed-Point Design for Real-Time ControlChanakya Hingu, Xingang Fu, Rajab Challoo, Jiang Lu, Xiaokun Yang, Letu Qingge. 445-450 [doi]
- Predicting COVID-19 using Machine LearningChitesh Khandelwal, Anita Singhrova. 451-458 [doi]
- Classifying Air Quality Using Machine Learning ModelsEman Abdelfattah, Yuval Ashkenazi. 459-463 [doi]
- How to Detect AI-Generated Texts?Trung T. Nguyen, Amartya Hatua, Andrew H. Sung. 464-471 [doi]
- Enhancing Precision and Robustness in Indoor Localization Using Temporal and Spatial Features for BLE FingerprintingMaria Camila Molina, Iness Ahriz, Charlie Galle, Michel Terré. 472-476 [doi]
- Predicting Stock Price Volatility Amid Controversies: Harnessing News, Tweets, and Google Search Trends with CNN and LSTMBetul Mescioglu, Osama Abuomar. 477-486 [doi]
- Formulating Emotion Graphs Through the Lens of Advanced AI ModelsDustin Miao, Rick Lee, Fang Rui Shen, Amanda Sun, Mingchuan Cheng, Megan Ho, Matthew Fang, Hanwen Hu, Catherine Fang. 487-494 [doi]
- Enhancing Cybersecurity: A Pipeline Approach for Efficient Machine Learning Intrusion DetectionEthan Berei, Ahmed Oun, M. Ajmal Khan. 495-501 [doi]
- Intentional Biases in LLM ResponsesNicklaus Badyal, Derek Jacoby, Yvonne Coady. 502-506 [doi]
- Predicting Excess Energy and Estimating Users for Vehicle-to-Grid (V2G) Services Using Machine LearningPrashanth Rajagopalan, Prakash Ranganathan. 507-515 [doi]
- MARTA: Modern Automatic Renderings from Text to AnimationEvelyn Griffith, Bryan Rachmat, Finian Lugtigheid, Andrew J. Park. 516-522 [doi]
- Integrating machine learning and infrared smart cameras into critically endangered bird productionConstance J. Woodman, Ashley Ridlon, Christopher J. Evelyn, Alexis Martinez, Damien Valles. 523-527 [doi]
- S.H.E.R.P.A (Super Helpful Engine Recognizing People's Audio)Tyler Cohen, Zach Ray, Devin Chen, Federica Aveta. 528-533 [doi]
- Conversational Swarm Intelligence (CSI) Enables Rapid Group InsightsLouis-Rosenberg, Gregg Willcox, Hans Schumann. 534-539 [doi]
- Advancing Person Re-Identification through Pose-Estimated FeaturesArnab Mukherjee, David O. Johnson. 540-544 [doi]
- HarmonyVisage: Ethical Facial Emotion Dataset Using Advanced Generative AIClaire Xu. 558-563 [doi]
- Towards Knowledge Extraction and Parsing of XML Metadata for SysML System Architecture ModelingCandice Normalee Chambers, Parth Ganeriwala, Siddhartha Bhattacharyya, Chiradeep Sen, Nasheen Nur. 564-570 [doi]
- Optical Flow-Based Pose Correction for Robust Robot Localization in Corridor EnvironmentsSuhyeon Kang, Heoncheol Lee. 571-576 [doi]
- Assessing Blockchain Consensus in Robotics: A Visual Homing ApproachNasim Paykari, Damian M. Lyons, Mohamed Rahouti. 577-583 [doi]
- RoboRover - A Jetson Nano Powered Robot Car for Object Following, Obstacle Avoidance, and Wall FollowingTrinh Huynh, James Walter, Federica Aveta. 584-589 [doi]
- Enhancing Cloud Security Posture for Ubiquitous Data Access with a Cybersecurity Framework Based Management ToolGregory Coppola, Aparna S. Varde, Jiacheng Shang. 590-594 [doi]
- Securing Communications for IRSs-Assisted mmWave Cognitive Radio NetworksReham Alsabet, Danda B. Rawat. 595-600 [doi]
- Development of A Multimodal Trust Database in Human-Robot Collaborative ContextsJesse Parron, Thai Thao Nguyen, Weitian Wang. 601-605 [doi]
- Assistive Reading Device for Blind IndividualsAnthony Huynh, Zoltan Marchant, Inderdeep Singh, Federica Aveta. 606-612 [doi]
- An AI based Smart Conference Calling System using Bluetooth TechnologyAnkita Dixit. 613-618 [doi]
- Longcut route control of a relay-node under the effect of strong interference in an ad hoc network with multiple autonomous robotsRisa Takeuchi, Tutomu Murase. 619-625 [doi]
- Sybil Attack Detection in VANETs using Fog Computing and BeamformingAbinash Borah, Anirudh Paranjothi. 626-631 [doi]
- Advancing Wireless IoT Sensor Networks With Edge-Powered RFID DevicesElisa Pantoja, Mircea Stan. 632-636 [doi]
- Empirical Evaluation of a LoRa Mesh Network for Emergency Communication SystemsBrenton Poke, Suleyman Uludag. 637-646 [doi]
- Semantic-Aware Blockchain Architecture Design for Edge-enabled MetaverseNing Wang, Beatriz Lorenzo. 647-654 [doi]
- LBCC: A Load Balanced Collaborative Caching in Content Based NetworkingMina, Dipannoy Das Gupta, Mahmuda Naznin. 655-662 [doi]
- Blockchain for Securing Custom/User-Defined Protocols in P4 Programmable SwitchesTemidayo Akinyemi, Oluwaseyi Ajayi, Ihab Darwish, Tarek N. Saadawi. 663-668 [doi]
- Design and Implementation of a Strong Arbiter PUF for the Security of FPGAJobeda Khanam, Kevin A. Cavicchi. 674-677 [doi]
- Developing and Evaluating Data-Driven Heart Disease Prediction Models by Ensemble Methods on Different Data Mining ToolsSuhaima Jamal, Walaa Abo Elenin, Lei Chen. 678-683 [doi]
- Exploring the Impact of Early Detection on DL-Based NIDSs ModelsMinxiao Wang, Ning Yang 0009, Ning Weng. 684-691 [doi]
- Enhancing Research Results with Programmable Blockchain NetworkOluwaseyi Ajayi, Tarek N. Saadawi. 692-697 [doi]
- Building a Robot to Identify Electric Vehicles from Infrared ImagesRémi Lamoureux-Lévesque, Derek Jacoby, Marc-Antoine Drouin, Jonathan Fournier, Xavier Maldague, Yvonne Coady. 698-703 [doi]
- AI Powered Multi-model Content Creation For Virtual Gallery Using Learning MachineYen-Wen Chen, Yi-Wei Chiu, Yu-Sin Liu, Chih-Yu Huang, Yu-Chun Shen. 704-709 [doi]
- Identification with CNNs by Fusing Face, Fingerprint, and Voice RecognitionSamuel B. Ehgartner, Ismail Jouny. 710-713 [doi]
- Density-Driven Multi-Agent Swarm Control with Potential Field Based Collision AvoidanceSungjun Seo, Kooktae Lee. 714-721 [doi]
- Caching and Computation Offloading for Intelligent Transportation Systems enabled by Satellite-Terrestrial NetworksS. Yang, X. Xia, Beatriz Lorenzo. 722-729 [doi]
- HMI Development for displaying V2X Safety AlertsSebastian Wallace, Scott LaForest, Girma S. Tewolde. 730-735 [doi]
- Embedded Virtualization on RISC-V with seL4Michael A. Doran, Nabeeh Kandalaft. 736-740 [doi]
- A Monocular Depth Estimation Method for Indoor-Outdoor Scenes Based on Vision TransformerJianghai Shuai, Ming Li, Yongkang Feng, Yang Li, Sidan Du. 741-747 [doi]
- FogAutho: Leveraging a novel authentication scheme for securing fog-cloud systems in smart home applicationsRajkumar Gaur, Sumit Kumar Tetarave, Rabindra K. Barik, Ezhil Kalaimannan. 748-753 [doi]
- Design of a Machine for the Optimization of the Potato Leaching Process to Produce Potato StarchKaterine Nayeli Raymundo Cardenas, Luiggie Wiliams Yallico Torres, Lisbeth Rosmery Asto Huarocc, Sario Angel Chamorro Quijano. 754-758 [doi]
- Design of a Column Deflection Detector Robot Using a Mechanical System and Artificial VisionDick Bertony Romero Jimenez, Sario Angel Chamorro Quijano, Carlos Alberto Coaquira Rojo. 766-770 [doi]
- Multi-Microcontroller Sensor Data Acquisition to Enhance UAV Attitude Control, Predictive Maintenance, and Healthcare SolutionsPrithwish Ray Chaudhuri, Rozeha A. Rashid, Waleed Ejaz. 771-777 [doi]
- Design of a Machine to Reduce Shrinkage and Cracking in the Rice Hulling ProcessKrhistians Enrique Chávez Cárdenas, Sario Angel Chamorro Quijano, Cleo Alex Alarcón-Vasquez, Rafael De la Cruz Casaño. 778-782 [doi]
- Design of a Prevention and Monitoring System for People with HypertensionJeremy Pool Ore Moran, Jeremy De La Cruz Cortez, Sander Erick Cayllahua De La Cruz, Piero Alexander Mantari Mendoza, Sario Angel Chamorro Quijano. 783-787 [doi]
- Design of a semi-automatic machine to improve garlic processing for the optimization of procedures (cutting, shelling and peeling) in agricultural areasLeonel Alvaro Llanco Guardia, Joel Marlon Huamani Caballero, Humberto Diego Cardenas Acosta, Sario Angel Chamorro Quijano, Rafael De la Cruz Casaño. 788-792 [doi]
- Modular Design Architecture of a HPEC SystemVikram Rajan, Nihar Ranjan, Amgothu Murali Krishna, N. J. Sandesh. 793-798 [doi]
- Transforming Online Learning with CNN and NLP: Personalized EducationAbilash Lathaharan, Danushan Ravendran, Agash Varatharasa, Abinaya Thayaparan, Sanvitha Kasthuriarachchi, Karthiga Rajendran. 799-804 [doi]
- Real-Time Livestock Activity Monitoring via Fine-Tuned Faster R-CNN for Multiclass Cattle Behaviour DetectionMisbah Ahmad, Wenhao Zhang 0006, Melvyn L. Smith, Ben Brilot, Matt Bell. 805-811 [doi]
- Random Forest Empowered Shade and Fault Detection in Photovoltaic PanelRakeshkumar Mahto, Kanika Sood, Nathaniel Ruppert. 812-820 [doi]
- Supervised Learning for Non-Invasive Pre-Diabetes, Type 1 and Type 2 Diabetes ScreeningKanika Sood, Azucena Lizbeth Jimenez Martinez. 821-829 [doi]
- Enhanced Nuclei Segmentation in Histopathology Image Leveraging RGB Channels through Triple-Encoder and Single-Decoder ArchitecturesRashadul Islam Sumon, Md Ariful Islam Mazumdar, Shah Muhammad Imtiyaj Uddin, Moon-Il Joo, Hee-Cheol Kim 0001. 830-835 [doi]