Abstract is missing.
- Architectural Flaw Detection in Civil Engineering Using GPT-4Saket Kumar, Abul Ehtesham, Aditi Singh, Tala Talaei Khoei. 1-6 [doi]
- Lung Cancer Classification Optimization using CNN and Edge Detector from CT Scan ImagesMd. Hasanuzzaman. 1-6 [doi]
- Optimizing Grass Selection for Beef Cattle Using Multi-Armed Bandit Algorithms: A Data-Driven Approach to Enhance Growth Through Rumination AnalysisYuan Xing, Zhiwei Zeng, Abhishek Verma, Cheng Liu, Tina Lee, Dongfang Hou, Haowen Pan, Sam Edwards, Wyatt Stehr. 7-12 [doi]
- Eliciting and Measuring Toxic Bias in Human-to-Machine Interactions in Large Language ModelsKyle Stein, Alexander Harvey, Aylanna Lopez, Uzma Taj, Shari Watkins, Lanier A. Watkins. 13-19 [doi]
- Exploring the use of Machine-learning and Non-Radial DEA for Transit efficiency score predictionShivanjali Khare, Nahom H. Demoz, Ahmed Omar Salim Adnan. 20-26 [doi]
- A Model Based on Genetic Algorithm for Solving Polynomial EquationsFarshid Sahba, Amin Sahba, Ramin Sahba, Vahideh Hashempour. 27-30 [doi]
- End-to-End Application and Backend State Management: A Comprehensive ReviewAnujkumarsinh Donvir, Pradeep Kumar Saraswathi, Apeksha Jain. 31-43 [doi]
- Improved Radiation Estimation at High Energy Facility for Public HealthJerry Cao-Xue, Hongfang Zhang, Adam Stavola, Bence Budavari, Chiman Kwan, Hongyi Wu, Jiang Li 0001. 44-50 [doi]
- Optimizing Transformer-based Models for Radiation Estimation at High Energy Accelerator FacilityJackie Wei, Hongfang Zhang, Adam Stavola, Bence Budavari, Chiman Kwan, Hongyi Wu, Jiang Li 0001. 51-57 [doi]
- Cluster-Based Genetic Algorithm Path Planning for Cooperative UGV and UAV Operations in Energy-efficient Wireless Sensor NetworksYuan Xing, Abhishek Verma, Zhiwei Zeng, Cheng Liu, Tina Lee, Dongfang Hou, Haowen Pan, Sam Edwards. 58-65 [doi]
- Optimizing Sleep Schedules for Energy-Efficient Agricultural Wireless Sensor Networks Using Deep Reinforcement LearningYuan Xing, Zhiwei Zeng, Cheng Liu, Abhishek Verma, Tina Lee, Dongfang Hou, Haowen Pan, Sam Edwards. 66-72 [doi]
- Classification Models and Feature Engineering for Non-Intrusive Load MonitoringDavid Shilane, Ashwathi Prakash Nair. 73-78 [doi]
- Building Generative AI Chatbot Using Oracle Cloud InfrastructureJay Ashok Shah, Nisha Ramesh Iyer. 79-84 [doi]
- Inkjet-printed Dry Flexible Electromyography Electrode Array for Classifying Finger Movements with AI AlgorithmsNabonita Mitra, Ucchwas Talukder Utsha, Bashir I. Morshed. 85-89 [doi]
- Music Therapy for Autism Spectrum Disorder: A Comprehensive Literature Review on Therapeutic Efficacy, Limitations, and AI IntegrationBeatrice Low, Xindi Liu, Richard Z. Li, Elizabeth Ren, Jasmine X. Zhang. 90-99 [doi]
- AITracker: A neural network designed for efficient and affordable eye trackingJacob Hogrefe, Emilio Cruz, Chetan Jaiswal, Jose Riofrio. 100-107 [doi]
- A Review: State-of-the-Art of Integrating AI Models with Moving-target Defense for Enhancing IoT Networks SecurityAmal O. Hamada, Salwa Mohamed Hassan, Salma Samy, Mohamed Azab, Efat Fathalla. 108-114 [doi]
- AI-Driven Automated Measurement of Abdominal Aorta Diameter in CT Scan ImagesVahideh Hashempour, Ramin Sahba, Amin Sahba, Farshid Sahba. 115-118 [doi]
- DyRAM: Dynamic Data Allocation and Resource Management in Distributed Machine Learning SystemsVaibhavi Tiwari, Rahul Thakkar, Jiayin Wang. 119-126 [doi]
- Predicting Audience Interests from Social Media Captions Using a Semi-Supervised ApproachAhmed Omar Salim Adnan, Hosnara Happy, Sadia Alam Tumpa, Shivanjali Khare. 127-133 [doi]
- Social Media Fake News Detection Using Machine Learning Models and Feature Extraction TechniquesZuhair Tahat, Ayman Gharaibeh, Majd Z. Tahat, William B. Glisson, Hosam Alamleh, Xiyuan Liu. 134-139 [doi]
- Accelerating Product Innovation: Impact of Serverless Computing and Generative AI on Application DevelopmentAnujkumarsinh Donvir, Sriram Panyam, Gunjan Paliwal, Praveen Gujar. 140-147 [doi]
- Secure and Ultra-Reliable 6G IoT Algorithms with AI-Enhanced Shared Key Physical Layer SecurityIsrat Ara, Brian Kelley. 148-157 [doi]
- Development and Evaluation of a Smart Agricultural ChatbotRahat Bhatia, Sanmeet Kaur. 158-163 [doi]
- Utilizing Visual-Spatial Perception to Detect Drowning-induced Suffocation in Swimming PoolsAadi Deshmukh. 164-168 [doi]
- The Dark Side of AI: Large Language Models as Tools for Cyber Attacks on Vehicle SystemsYusuf Usman, Prashnna K. Gyawali, Sohan Gyawali, Robin Chataut. 169-175 [doi]
- Towards immersive cybersecurity workforce development for mission-critical IoT SystemsFatemeh Sarshartehrani, Anthony Lee, Mohamed Azab, Trenton Watkins, Denis Gracanin. 176-182 [doi]
- A Survey: Emerging Cybersecurity Threats in Driverless CarsVaibhavi Tiwari, Dharshana Rajasekar, Jiayin Wang. 183-189 [doi]
- High-Precision Robotic Arm for Silicon Wafer Handling and Alignment in Small-Scale Semiconductor FabricationLuke Bassett, Maria Apostle, Federica Aveta. 190-195 [doi]
- Remotely-Controlled Telerehabilitation in Virtual Reality Using IoT ArchitectureJoseph Finkelstein, Teyi Tsai. 196-201 [doi]
- Interpretable Deep Learning for Monkeypox Lesion Classification: A Study Using Model-Agnostic Explainability TechniquesImran Ahmed 0002, Misbah Ahmad. 202-209 [doi]
- IYOLO-FAM: Improved YOLOv8 with Feature Attention Mechanism for Cow Behaviour DetectionMisbah Ahmad, Wenhao Zhang 0006, Melvyn L. Smith, Ben Brilot, Matt Bell. 210-219 [doi]
- AI-Enhanced Visual Inspection Systems for Robust Detection of Product Packaging Defects in Manufacturing EnvironmentsImran Ahmed 0002, Muftooh Ur Rehman Siddiqi, Misbah Ahmad. 220-225 [doi]
- Enhancing Phishing Detection with AI: A Novel Dataset and Comprehensive Analysis Using Machine Learning and Large Language ModelsRobin Chataut, Yusuf Usman, Chowdhury Mohammad Abid Rahman, Sohan Gyawali, Prashnna K. Gyawali. 226-232 [doi]
- A Data-Centric Approach to Post-Pandemic Housing Market AnalysisMatin Pirouz, Preston Mccullough. 233-242 [doi]
- Assessment of Water Conservation Function Based on Deep AutoencoderXiaoqing Fan, Xianghong Lin, Hao Liu. 243-249 [doi]
- Performance Comparison of Estimation Methods in Network AnalysisMatin Pirouz. 250-256 [doi]
- Conversational Swarms of Humans and AI Agents enable Hybrid Collaborative Decision-makingLouis B. Rosenberg, Hans Schumann, Christopher Dishop, Gregg Willcox, Anita Woolley, Ganesh Mani. 257-263 [doi]
- Multilingual Standalone Trustworthy Voice-Based Social Network for Disaster SituationsMajid Behravan, Elham Mohammadrezaei, Mohamed Azab, Denis Gracanin. 264-270 [doi]
- Affordable Self-Tuning Smart Queue Management for Home NetworksAndy Zheng, Mira Yun. 271-277 [doi]
- Adaptive Tracking: Dynamic Frame Rate for Drone-Based Target FollowingJunpeng Guo, Chunyi Peng 0001. 278-285 [doi]
- Enhanced Person Tracking with Metric-Based Learning and Diverse Detector Integration (DDI)Arnab Mukherjee, David O. Johnson. 286-290 [doi]
- Fully Auto-Regressive Multi-modal Large Language Model for Contextual Emotion RecognitionHiroshi Nonaka, Damian Valles. 291-299 [doi]
- Enhancing Fire Safety with UAV Real-Time 3D Mapping and Hotspot Detection for Improved Emergency ResponseSwarnamouli Majumdar, Sonny Kirkley, Mayur Srivastava, Aamir Khan. 300-307 [doi]
- Revolutionizing Road Accident Analysis: A Deep Learning Approach to Entity Recognition and ExtractionAakarsh Surendra, Kanika Sood, Craig Albuquerque, Shirin Akbar, Gourav Joshi, Pallavi Sakshi. 308-314 [doi]
- Implementation and Testing of an Experimental Near-Real-Time Patient Bedside Monitor Datastream Analysis and Alerting System in a Live Emergency DepartmentLeo Kobayashi, Adewole Oyalowo, Uday Agrawal, Shyue-Ling Chen, John W. Gosbee, Xiao Hu, Kenneth A. Loparo, Gregory D. Jay, Derek Merck. 315-322 [doi]
- Hybrid CNN-LSTM Model for Jail Activity RecognitionMounika Sri Sai Apurva Nemalipuri, Dinesh Kothandaraman, Shivanjali Khare. 323-327 [doi]
- An Empirical Study of Caching Impact on an AWS Hosted WebsiteDane Richardson, Wei Hao. 328-334 [doi]
- Towards a Lightweight Self-Sovereign Identity Framework for IoT Network in a zero trust EnvironmentEfat Fathalla, Youssef Azab. 335-341 [doi]
- InDeKX: A High Efficiency Intrusion Detection and Knowledge Exchange Architecture for Secure Edge Computing ServicesNishar Miya, Rasib Khan, Preshika Basnet, Sajan Poudel. 342-349 [doi]
- Supervised Learning Algorithm for Deep Spiking Neural Networks Based on Instantaneous ErrorYanan Li, Xianghong Lin, Xiaoqing Fan. 350-355 [doi]
- A Parallel Steganography Algorithm Using a New Secret Key GenerationAhmed Imad Hammoodi Al-Jarah, Jorge Luis Ortega-Arjona. 356-365 [doi]
- Comparative Study of Machine Learning Algorithms for Student Retention, early warning and intervention systems for Institutions of Higher LearningMilka C. I. Madahana, John E. D. Ekoru. 366-371 [doi]
- Autoregressive Modeling of Time Series in Renewable Energy SystemsKaan Icer, Showrov Rahman, Kaushallya Adhikari. 372-378 [doi]
- Continuous Authentication of Smartphones using a Convolutional Neural Network ModelJohn Reichenbach, Sherif Rashad. 385-391 [doi]
- Detecting Various Hand Gestures from EMG Signals Using Inkjet-printed Dry Flexible Electrodes with Machine Learning AlgorithmsNabonita Mitra, Moriom Rojy Momota, Bashir I. Morshed. 392-397 [doi]
- Predicting Climate Change: A Linear Regression & Convex Optimization ApproachSaurabh Kapoor. 398-403 [doi]
- Deepfake Attacks on Biometric Recognition: Evaluation of Resistance to Injection AttacksRahul Vijaykumar, Sandip Purnapatra, Richard Plesh, Masudul H. Imtiaz, Daqing Hou, Stephanie Schuckers. 404-410 [doi]
- Deepfake Attacks on Biometric Recognition: Evaluation of Resistance to Injection AttacksRahul Vijaykumar, Sandip Purnapatra, Richard Plesh, Masudul H. Imtiaz, Daqing Hou, Stephanie Schuckers. 404-410 [doi]
- Deepfake Attacks on Biometric Recognition: Evaluation of Resistance to Injection AttacksRahul Vijaykumar, Sandip Purnapatra, Richard Plesh, Masudul H. Imtiaz, Daqing Hou, Stephanie Schuckers. 404-410 [doi]
- Fitting and Filtering Functional Data for Use in Video Data AnalysisIain Nicholas Smith, Mohamad El Hajj. 411-418 [doi]
- Predicting Emotional States from Wearable ECGTimothy C. Sweeney-Fanelli, Ernesto Sola-Thomas, Naveenkumar G. Venkataswamy, Justin C. Au-Yeung, Masudul H. Imtiaz. 419-425 [doi]
- Pedestrian Crosswalk Safety at Intersections using YOLOv8 DetectionMann Patel, Heba Elgazzar. 426-430 [doi]
- A Framework for automated selective Fine-Tuning of Domain-Specific Large Language Models Using Graph-Based Retrieval Augmented GenerationHariharan Govindharajan, Senthilkumar Vijayakumar. 431-439 [doi]
- Dynamic Logistic Ensembles with Recursive Probability and Automatic Subset Splitting for Enhanced Binary ClassificationMohammad Zubair Khan, David Li. 440-447 [doi]
- Using Fitbit to Implement Personalized Walking Programs in Older AdultsTe-Yi Tsai, Aref Smiley, Joseph Finkelstein. 448-453 [doi]
- Comparison of quantum computing algorithms for network traffic partitioning and mitigation of DoS and DDoS attacksCasimer DeCusatis, Evan Spillane, Dominick Foti, Megan O'Loughlin. 454-460 [doi]
- Understanding and Mitigating Social Engineering Attacks to Elderly People: A Comprehensive Survey of Methods, Impacts, and Future SolutionsHayin Tamut, Indira Kalyan Dutta. 461-470 [doi]
- Adaptive Row Activation and Refresh a Hybrid Approach to Mitigate RowHammerNevzat U. Demirseren, Iman Vakilinia. 471-476 [doi]
- The Rise of Artificial Intelligence: Industry Insights and Applications in Security Information and Event Management (SIEM)Md Liakat Ali, Kutub Thakur, Helen Barker, Michael Chan. 477-482 [doi]
- System for Detecting and Jamming Unauthorized Communications Using RF-SDRHosam Alamleh, Laura Estremera. 483-487 [doi]
- Towards User-Driven Exoskeletal Assistive Control using Deep Reinforcement LearningChinmayi Goyal. 488-494 [doi]
- Bangla SBERT - Sentence Embedding Using Multilingual Knowledge DistillationMd. Shihab Uddin, Mohd Ariful Haque, Rakib Hossain Rifat, Marufa Kamal, Kishor Datta Gupta, Roy George. 495-500 [doi]
- Video Steganography Algorithm Defining the ROI using Haar-Like Features and Convolutional Neural NetworkArzu Susoglu, Khaled Elleithy. 501-505 [doi]
- Application of Machine Learning Models for Predictive Analytics on AI4I 2020Hard Rakesh Shah, Brian Haley, Eman Abdelfattah. 506-511 [doi]
- Securing Mobile Finance: Trends, Mitigations, and Best PracticeHosam Alamleh, Laura Estremera. 512-516 [doi]
- DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on DevelopersHossein Siadati, Sima Jafarikhah, Elif Sahin, Terrence Brent Hernandez, Elijah Lorenzo Tripp, Denis Khryashchev, Amin Kharraz. 517-523 [doi]
- Anonymous Messaging for IoT and Cloud Security Using PUF-Based Protocols: A Lightweight Alternative to SSLTristan Digert, Majd Safi, Eric B. Clark, Tarek A. Idriss. 524-530 [doi]
- Emergency Wireless Chatting Using RFJobin Joseph, Ramone Bolton, Constantin Filiuta, Chris Danetti, Supriyo Karmakar. 531-535 [doi]
- Fingerprinting Browsers in Encrypted CommunicationsSandhya Aneja, Nagender Aneja. 536-538 [doi]
- 6G Vision-Intelligent Millimeter-Wave Systems on High-Altitude Platform StationsMohammad Shah Alamgir, Brian Kelley. 539-547 [doi]
- Virtual Reality on Assessing the Motor Skills of Individuals with Autism Spectrum DisorderAyesha A. Malik, Abrar M. Zaki, Ngoc Chung Tran, Irene X. Liang, Ting Liu, Damian Valles. 548-555 [doi]
- Deepfake Detection Using Transfer LearningShafiqul Alam Khan, Damian Valles. 556-562 [doi]
- Is Everlasting Security Necessary?Albert H. Carlson, Benjamin Williams, Sai Ranganath Mikkilineni. 563-569 [doi]
- An Interactive Robotic System for Efficient Book Borrowing and Returning in a Library EnvironmentAmna Mazen, Weiming Chen, Wenting Wei, Daojun Teng, Mariam Faied. 570-575 [doi]
- RoboRuggles: Design of a Combat RobotBelinda Truong, Brian Nolasco-Ramirez, Sophia Sistachs, Sophia Puga, Ryan Ballard, Mackeen Al-Hiraky, Shauib Ibraheem, Isaiah Alleyne, Saurav Basnet. 576-580 [doi]
- Towards A Minimalistic Sensor-Based Smart Soccer Net With Machine LearningNguyen Ho, Zaid Fafouri, Austin Gregory, Michael Okwori. 581-586 [doi]
- Supervised Learning with Informed Graph ConvolutionL. David Aites, David E. Stewart. 587-592 [doi]
- Enhancing Early Diagnosis of Autism With Machine Learning Algorithms Using Postural Control FeaturesMaya Nachega, Sugru A. Yahaya, Ila Wallace, Ting Liu, Damian Valles, Rachel M. Koldenhoven, Yumen Li. 593-598 [doi]
- Sidewalk-Based Accessible Pedestrian RoutingFinian Lugtigheid, Andrew J. Park, Eunju Hwang, Valerie Spicer, Patricia L. Brantingham. 599-604 [doi]
- An Innovative System for Real-Time Translation from American Sign Language (ASL) to Spoken English using a Large Language Model (LLM)Larry Emerson Johnson, Sherif Rashad. 605-611 [doi]
- Intelligent Automation of SFO Crime Prediction using Multiple Artificial Intelligence MethodsPraveen Kuruvangi Parameshwara, Shilpa Gupta. 612-619 [doi]
- Achieving Net-Zero for 555 Huntington AvenueFederica Aveta, Logan M. Cabral, Tj Colville, Adam F. Gonneville, Tedi Qafko, Saurav Basnet. 620-625 [doi]
- A Small-Scale Intra-IoT Network Prototype for Centralized Monitoring of CPS/IoT Devices on Isolated IntranetsWookwon Lee, Keegan J. McCann, Nicholas A. Nagy, Joseph L. Kvortek, Christopher P. Petteys, Joshua A. Hicks, Damien T. Chu. 626-630 [doi]
- Object Tracking Spherical Underwater Sensing RobotTedi Qafko, Patrick Blanchard, Quang Vu, Federica Aveta. 631-635 [doi]
- Enabling Moving Target Defense for Real-Time CPS SecurityRajarshi Mukherjee, Mohamed Azab, Thidapat Chantem. 636-642 [doi]
- Enhancing Abstraction in Large Language Models Through Nature-Inspired Semantic PatternsPravir Malik, Arjun Subedi. 643-649 [doi]
- Effects of Common Sense and Supporting Texts for the Important Words in Solving Text Entailment Tasks - A Study on the e-SNLI DatasetTrung T. Nguyen, Amartya Hatua. 650-655 [doi]
- Hardware Implementation of Real-Time 2D DOA Estimation Algorithm Using an L-Shaped ArrayNizar Tayem, Austin Burns, Kameron Hansen, Sam Pearson, Noah Blount, David Reyes, Ahmed A. Hussain. 656-661 [doi]
- Future non-volatile memory for semiconductor industrySupriyo Karmakar. 662-666 [doi]
- An Adaptive Dropout and Parallel Computing Approaches for Accelerating RNN ControllerKushal Kalyan Devalampeta Surendranath, Maxwell Sam, Letu Qingge. 667-675 [doi]
- Interference-Limits Aware Power and Receiver Optimization for 5G NR-U and Wi-Fi in the 6 GHz Shared-SpectrumRasika Nilaweera Kalahe-Wattege, Fernando Beltrán, Jairo A. Gutiérrez. 676-682 [doi]
- Revisiting FastTap: Effects of Increasing Command Capacity of Spatial Memory Menus in TabletsSayeem Md. Abdullah, Md. Sami Uddin. 683-689 [doi]
- MBSE for Contingency Planning for Cellular Networks with OPMHemant Purohit, Siddhartha Bhattacharyya. 690-697 [doi]
- LUT-Based Multipliers for IEEE-754 Floating Point Arithmetic on FPGAsNoureddine Chabini, Marilyn Claire Wolf, Rachid Beguenane. 698-701 [doi]
- WingsSL: Integrated Approach for the Detection and Conservation of Birds in Sri LankaR. G. H. S. Rajapaksha, D. C. Gonapoladeniya, H. H. S. Peiris, H. P. N. S. Siriwardana, N. D. U. Gamage, K. T. S. Kasthuriarachchi. 702-708 [doi]
- CodeNexa: A Novel Security Framework for Federated Learning to Mitigate Man-in-the-Middle AttacksB. L. H. Peiris D, J. P. A. S. Pathmendre, A. R. W. M. Hasaranga V, A. M. I. R. Athauda B, Kanishka Yapa, Samadhi Rathnayake. 709-714 [doi]
- Graph-Based Ranking Techniques for Improving VLSI PlacementTruong Xuan Dinh, Tien Dung Do. 715-719 [doi]
- Optimizing Breast Cancer Classification with Ensemble Methods: A Focus on Bagging TechniquesSultan Ahmed Almalki. 720-723 [doi]
- Remote Estimation of Above Ground Forest Biomass Using LiDAR and Drone ImageryCade Parlato, Neil Loftus, Sam McGrath, Husnu S. Narman, Rick Gage. 724-729 [doi]
- Performance Analysis of Machine Learning Models for Predicting Order Process ManagementArun Prasad Jaganathan, Shadi Khan Baloch. 730-736 [doi]
- Design of a Machine for the Production of Advanced FabricsRaul Oswaldo Meza Torres, Anthony Jesus Hinostroza Flores, Luis Enrique Soto Otivo, Sario Angel Chamorro Quijano, Roberto Belarmino Quispe Cabana. 737-742 [doi]
- Dynamic Strategy Optimizer (DSO): Application In Enhancing New User Engagement in Hybrid Recommender SystemAli Mohammadi, Ali Soleimani, Shamsad Parvin. 750-756 [doi]
- Mapping Crime Dynamics: Integrating Textual, Spatial, and Temporal PerspectivesTarun Reddi, Charvi Kusuma, Shamsad Parvin. 757-763 [doi]
- Maximum likelihood estimator for Zipf distribution: a new approachLizeth Carrillo-Mancilla, Luis Rizo Domínguez. 764-770 [doi]
- Federated Learning with Authenticated ClientsSagar Pathak, Dipankar Dasgupta. 771-780 [doi]
- A Dual-Stage Ensemble Approach to Detect and Classify Ransomware AttacksPeizhi Yan, Tala Talaei Khoei, Reena Sajad Hyder, Reemaa Sajad Hyder. 781-786 [doi]
- Development and Evaluation of an AI-Enhanced Python Programming Education SystemEric Zabala, Husnu S. Narman. 787-792 [doi]
- Enhanced Categorization of Cybersecurity VulnerabilitiesOcheme Anthony Ekle, Denis A. Ulybyshev. 800-806 [doi]