


default search action
29th SNPD Summer 2025: Busan, Korea
- 29th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2025 Summer, Busan, Korea, Republic of, June 25-27, 2025. IEEE 2025, ISBN 979-8-3315-1258-3

- Tokuro Matsuo:

Keynote 1 : Cyber-Physical Event Business Systems. 1 - Simon Xu:

Keynote 2 : From Data to Development: Empirical Approaches in Software Engineering. 1 - Yeong-Tae Song:

Keynote 3 Personal Health Coaching Framework Using Digital Twin and On-Device AI. 3 - Junghwan John Rhee:

Cybersecurity Analysis and Detection of Advanced Cyber Threats. 4 - Miguel Vargas Martin:

Two Decades of Applied AI: A Research Journey Through Security, Networks, and Language. 5 - Srikant Krishnan, Nary Subramanian:

Semantic Search in a Document Management System Using Retrieval Augmented Generation. 6-10 - Fateh Boulmaiz, Patrick Reignier, Stéphane Ploix:

Integrating Exploration into Case-Based Reasoning: A Strategy for Enhanced Knowledge Acquisition. 11-18 - Yuan-Long Peng:

Probability-Driven Hedge Ratio Optimization Using Machine Learning: An Adaptive Approach to Financial Risk Management. 19-24 - Shun Hirai, Sinan Chen, Sachio Saiki, Masahide Nakamura:

Personalized Energy-Saving Behavior Promotion System Based on User Utterance Analysis and LLM. 25-30 - Hiroki Fukushima, Kazuaki Yamaguchi, Masahide Nakamura:

Tourist Driving Route Optimization Incorporating Congestion-Based Travel Time Variations. 31-36 - Leila Rzayeva, Perizat Tazhibayeva, Yonghao Wang, Dauren Izdibay, Nursultan Nyssanov, Zhaksylyk Kozhakhmet:

Adversarially Resilient Multi-Label Object Detection: An Ensemble of ViT, EfficientNetV2-L, and YOLO12 for Forensic Imagery. 37-42 - Leila Rzayeva, Daniil Pogolovkin, Timur Grigoryev, Assel Khassanova, Ali Myrzatay, Yonghao Wang:

Development of an Advanced Correspondence and Call Analyzer for Digital Forensics Using Neural Networks and Vector Database. 43-48 - Samia Sammoud, Inès Alaya, Moncef Tagina:

A new metaheuristic inspired by acoustic communication in ant colonies. 49-56 - Jinong Li, Chunyan Ma, Wei Lin, Zhe Zhang:

MS-CUP: A Multi-Source Code Comment Updating Method. 57-62 - Gopi Krishna Akella, Santoso Wibowo, Srimannarayana Grandhi, Fariza Sabrina, Sameera Mubarak:

MetaCropX: A Blockchain-based Architecture for Dynamic Tokenization and Smart Crop Lifecycle Management. 69-75 - Hana Majed

, Hela Zorgati, Raoudha Ben Djemaa:
Integration of Machine Learning and Artificial Intelligence into IoT Systems for Intelligent Resource Management. 76-81 - Leila Rzayeva, Yonghao Wang, Alissa Ryzhova, Merei Zhaparkhanova, Zhaksylyk Kozhakhmet, Alisher Batkuldin

:
Password Vulnerability Detection Based on Social Media and Personal Information. 81-86 - Assel Khassanova, Leila Rzayeva, Abilkair Imanberdi, Yussuf Hassan Ahmed, Perizat Tazhibayeva:

Combating Information Uncertainty: SIR-Based Diffusion Analysis and Neural Semantic Search for Social Networks and Darknet Monitoring. 87-91 - Chongwen Wang, Zhi Cao, Ke Zhou:

Towards Faithful and Explainable Large Language Models: A Knowledge Graph-Guided Framework for Reasoning Enhancement and Hallucination Mitigation. 92-99 - Keiko Kodama, Takuya Nakata, Sinan Chen, Sachio Saiki, Masahide Nakamura, Kiyoshi Yasuda:

Proposal of a Memory Support System Utilizing First-Person Perspective Snapshots for Older Adults. 100-105 - Abilkair Imanberdi, Assel Khassanova, Yerassyl Yermekov, Madi Shayakhmetov

, Aigerim Alibek, Olzhas Konakbayev:
Development of a data decryption method for the raw disk image of mobile phone. 106-110 - Dina Satybaldina

, Nazerke Bisenbaeva, Aliya Issainova, Yerzhan Seitkulov, Tolegen Aidynov, Mamyr Altaibek
:
Improving the efficiency of attack detection in cellular networks through the combination of statistical feature selection methods and machine learning algorithms. 111-116 - Ilia Andreev, Vyacheslav Petrenko, Fariza Tebueva, Dina Satybaldina, Tolegen Aidynov, Kakim Sagindykov:

A Mathematical Model for Device Authentication in Trusted Interaction in Decentralized Internet of Things Environments. 117-122 - Valery Zolotarev, Gennady V. Ovechkin, Dina Satybaldina, Zhuldyz Sailaukyzy, Murat Kozhanov:

Modern Methods for Ensuring Data Integrity in Radio Channels. 123-126 - Taras Fedynyshyn, Olha Partyka, Ivan Opirskyy, Abilkair Imanberdi, Alisher Batkuldin

, Olzhas Konakbayev:
Leveraging Multimodal Large Language Models for Digital Forensics in Military Personnel Detection in Mobile Device Images. 127-132 - Dina Satybaldina, Tolegen Aidynov, Fariza Tebueva, Saken Tleuberdin

, Konstantin Malakhov, Gulsipat Abisheva:
Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques. 133-138 - Ha Jin Hwang, Monowar Mahmood, Mahadi Hasan Miraz, Mikkay Wong Ei Leen, Mergen Drusen, Narishah Mohamed Salleh:

User Adoption and Implementation of AI Assisted Accounting Systems Among Businesses in Kazakhstan. 139-144 - Sejma Hasak, Bilal Saoud, Leila Rzayeva, Dina Satybaldina

, Saken Tleuberdin
, Gulsipat Abisheva:
Machine Learning Based on Handover Decision in 5G/6G Cellular Networks: Survey. 145-150 - Aliya Zhetpisbayeva, Ibraheem Shayea, Zhaksylyk Kozhakhmet, Aigerim Alibek, Nursultan Nyssanov, Azamat Baibussinov:

The Effect of TRIM Function on Data Recovery from SSD Solid-State Drives. 151-156 - Enea Osmëni, Ibraheem Shayea, Bilal Saoud, Olzhas Konakbayev, Nurzhan Bazhayev, Aigul Shaikhanova:

Towards 6G: Understanding Handover Strategies and Protocols for Future Mobile Communication Systems. 157-162 - Aigul Shaikhanova, Yerbolsyn Jilkibayev, Yernat Atanbayev, Kamil Ayapbergenov, Konstantin Malakhov, Aizhan Tokkuliyeva:

Vulnerability Analysis Of Wi-Fi And Lte Networks For Secure Smartphone Design. 163-168 - Omar Masoud, Ibraheem Shayea, Bilal Saoud, Dina Satybaldina, Murat Kozhanov, Zhuldyz Sailaukyzy:

Optimizing Discovery Protocol for Enhanced Network Capacity and Mitigating Broadcast Storms in Software-Defined Networks. 169-174 - Liyan Sheng, Yan Zhang, Xin Lyu:

The Impact of Multimodal Design in Virtual Reality on Mindfulness Experiences. 175-180 - Yinglong Yu, Zhaopu Yao, Fang Yuan:

A Comparative Analysis of Chinese and English Media Discourse on Paris Olympics: Leveraging LDA and LLM Prompt Engineering. 181-186 - Keming Wang, Hui Tian, Jiawei Wang, Ju Hou:

Fuzzy-LLM: Multi-Agent Task Planning with Large Language Models. 187-192 - Yinglong Yu, Hao Shen, Zhengyi Lyu, Qi He:

Application and Optimization of Large Models Based on Prompt Tuning for Fact-Check-Worthiness Estimation. 193-198 - Hongji Bai, Zhou Sun, ZhaoHui Bai, Yuhang Wang, Runshun Zhang, Xiaoping Zhang:

Enhanced Contrastive Learning for Prediction in Medical Temporal Knowledge Graph. 199-204 - Yusuf Saraçlioglu, Bilal Saoud, Ibraheem Shayea, Geum Yong Pil, Leila Rzayeva:

Environmental Sound Recognition (ESR) with Python. 213-218 - Arda Deniz, Bilal Saoud, Ibraheem Shayea, Shambulov Ulykbek, Abilkair Imanberdi, Fuad Abdulgaleel Abdoh Ghaleb:

Audio Data Analysis and Music Genre Classification with Various Machine Learning Techniques. 219-224 - Siuli Sarkar, Trisa Maity, Elisha Mitra, Takaaki Goto, Ankur Bhattacharjee, Partha Ghosh

:
CureCast: A Personalized Health Monitoring Model Utilizing Machine Learning Algorithms. 225-231 - Partha Ghosh

, Ankit Kumar, Prateek Sinha
, Shreechandra Neogy, Sujal Das
, Tamal Tapas Ghosh
, Takaaki Goto, Soumya Sen:
Mood-Based Personalized Tourism Recommendation System Using Sentiment Analysis. 232-237 - Chase D. Carthen, Lukas Lac, Rich White, Thomas Braun, Josue Ochoa, Alireza Tavakkoli, Frederick C. Harris Jr.:

N-CATS: A Neural Network Classification Automatic Taxonomy System. 238-243 - Hossein Jamali, Sergiu M. Dascalu, Frederick C. Harris Jr.:

The Evolution of AI-Driven Temperature and Moisture Sensing Systems (2010-2025): A Systematic Review. 244-251 - Nikhil N. Sharma, Kaden Nesch, Sergiu Dascalu, Frederick C. Harris Jr.:

Evaluating Data Presentation Tools for Effective Communication. 252-259 - Vinh D. Le, Levi Scully, Brandon Rowell, Nicholas Jarvis, Heather Zechter, Pengbo Chu, Frederick C. Harris Jr., Sergiu Dascalu:

Fulcrum: A User Study Support Approach for HCI Research Studies. 260-265 - Nicole Beaulieu, Sergiu Dascalu, Emily Morgan Hand:

Vibe Coding: A Multivocal Systematic Mapping Study. 266-273 - Hannes Fassold:

A flexible toolkit for real-time action recognition of virtual humans in XR/AR environments. 274-279 - Jung-Jae Lee, You-Kyung Lee:

A Study on Copyright Management in Generative AI Technology Environment. 280-284 - Seung Hee Kim, Dong Ju Ryu:

A Method for Enhancing the Quality of Video/Image Data for AI Learning of Unstructured Data. 285-292 - Jin-Hee Lee, Jin-Hee Son:

Harnessing AI Marketing Strategies for the Senior Consumer Market. 293-297 - Jin-Hee Lee, Jin-Hee Son:

Exploring the Characteristics of the MZ Generation and Their Influence on Kidult. 298-302 - Seung Hee Kim, Dongju Ryu:

Research on the implementation of AI data performance verification tools. 303-307 - Jeesun Ryu, Yoonseuk Woo, Kyeongghyun Lee:

Implementation of RAG-LLM Based AI Agents for Public Service Innovation: RAG System Architecture Analysis and A Cross-National Case Study. 308-321 - Arailym Tleubayeva

, Aigerim Mansurova, Sultan Aubakirov, Aisultan Tabuldin, Adai Shomanov, Zhansaya Makhambetova:
Multilingual QA-RAG: Evaluating LLMs' Contradiction Handling in English and Kazakh. 322-327 - Alina Nikitina, Aiavrina Efimova, Sanaaia Okhlopkova, Solangel De la Rosa, Wooho Kang, Kwangsup Shin:

Framework for Cross-Country Assessment of Logistics Efficiency on Asia-Europe Trade Routes. 328-332 - In Hyo Park, Seok Hoon Park, Jeong Min Ji, Dae Keun Ryu, Yong Jun Jo, Yoon Hong Min:

Every Movement You Take Enhances Learning: A Curriculum-Based Multi-Agent Framework for Warehouse Robotics. 333-337 - MiJeong Kim:

A Study on the Impact of Supervisors' Coaching Leadership on Organizational Performance - Focusing on the Job Attitudes of Contact Center Employees. 338-340 - Hyunsu Park, Junbeom Park, Yongsu Ahn, Minsu Kim, Jongsou Park:

Climate Forecasting in the Metaverse using FedKAN for Lightweight Learning. 341-346 - YounHee Hwang, Jong-Woo Park:

The Impact of Sense of Community on Mindfulness: The Mediating Effects of Trust, Norms, and Networks. 347-349 - YounHee Hwang, Jong-Woo Park:

A Study on the Impact of Social Capital on Quality of Life. 353-355 - Seong-Hyeon Jo, Ji-Yeon Kim, Ki-Hwan Kim, Young-Jin Kang, Seok Chan Jeong:

Improving Operational Efficiency in Busan Port: A Predictive Approach to Truck Congestion. 356-361 - Seong-Sil Jeong, Jong-Woo Park:

A Study on the Effect of Leader's Coaching Behavior on Job Satisfaction and Quiet Quiting. 362-364 - Seong-Sil Jeong, Jong-Woo Park:

Effect of Leader's Coaching Behavior on Quiet Quiting of Organizational Members: Mediating Effects of Work Engagement and Job Satisfaction. 365-367 - Seong-Sil Jeong, Jong-Woo Park:

A Study on the Structural Relationship between Leader Coaching Behavior and Quiet Quiting and Positive Psychological Capital of Members in an Organization. 368-370 - Heejin Cho, Jiyeun Kim, Soim Park, Jong-Woo Park:

The Effect of Creative Self-Efficacy on Adaptive Performance of Childcare Teachers: The Dual Mediating Roles of Psychological Capital and Psychological Empowerment. 371-373 - Cheongha Yeum, Sunghee Baek:

Job Satisfaction and Mental Health in Teaching Hospitals: A Qualitative Study Based on Herzberg's Motivation-Hygiene Theory. 374-376 - Sei-Yon Hong, Jong-Woo Park:

The Effect of Adult Attachment on Organizational Effectiveness. 377-379 - Sei-Yon Hong, Jong-Woo Park:

A Study on the Effect of Interpersonal Relationships on Organizational Commitment. 380-382 - In-Jeong Shin, Jong-Woo Park:

Impact of Work-Family Facilitation and Conflict on Daily Life Stress among Dual-Income Women: Focusing on the Mediating Effect of Marital Emotional Intimacy. 383-386 - In-Jeong Shin, Jong-Woo Park:

A Study on the Effects of Work-Family and Work-Parenting Conflicts on Subjective Well-being of Working Mothers: Focusing on the Mediating Effect of Social Support. 387-390 - Athita Onuean, Pusit Kulkasem, Nilrat Kanyunthong, Sirapat Tansavetwong, Jitti Kunphruk, Korakod Thananchai, Chalitda Madhyamapurush, Krisana Chinnasarn:

Towards eID Authentication: Readiness Assessment System for ThaID Integration. 391-396 - Chakin Pattanasombatsakul, Nakornthip Prompoon:

Defining Software Quality in Use Metrics for Learning Management System. 397-404 - Melvin Yashnil Ramkhelawan, Srimannarayana Grandhi, Santoso Wibowo:

A Hybrid Quantum-Classical Deep Learning Algorithm for Efficient Arrhythmia Classification. 405-410 - Guan-Jhu Chen, Chu-En Lin, Jhan-Fong Lin, Yi-Feng Luo, Sheng-Chien Ko, Chun-Liang Liu:

Thermal Risk Assessment and Safety Prediction for Lithium-Ion Batteries under Abuse Conditions. 411-417 - Nuttaporn Phakdee, Saisunee Pradubnak, Aritath Siraphatwongkorn:

Exploratory Analysis of Software Engineering Skill in Thailand's Software Industry Using NLP Techniques. 418-423 - Pholphisin Suvanachai, Akkarach Kawbunjun

, Jutarat Kittiwanich, Nittaya Wutticharoenmongkol, Nanthiya Poolsawat, Napat Somwadee, Wilasinee Pophan, Parawee Jamying, Kanokorn Hornak, Chatnalin Yoakarakun, Adulvit Chucherd, Attachai Intarasab, Marut Panchapornudomlap:
Early warning system prototype development to mitigate coastal aquaculture activities from the climate variability using internet of things (IoT) and artificial intelligence (AI) technologies in Thailand. 424-430 - Pholphisin Suvanachai, Akkarach Kawbunjun

, Saransiri Nuanmanee
, Amornchai Somjetlertcharoen, Aongart Aun-A-Nan:
Telemedicine for Aquaculture Animal Health Using Artificial Intelligence (AI) in Thailand. 431-436 - Takafumi Nakanishi, Ponlawat Chophuk, Krisana Chinnasarn:

AIM-CF: Fast and Precise Counterfactual Explanations via Approximate Inverse Models. 437-441 - Kittisak Onuean, Krisana Chinnasarn, Watcharaporn Somphongphueng, Prayong Nooyen, Athita Onuean, Wirote Chompoo:

Human-Centric Software Co-Designed Framework for Competency Evaluations. 442-447 - Werayoot Kunphai, Twittie Senivongse:

Model-Driven Development of Web Application Backend Using Node.js Framework. 448-454 - Peerasak Pianprasit, Nuttaporn Phakdee, Jirayus Arbking, Ungsumalee Suttapakti, Krisana Chinnasarn:

Machine Learning-Based API Framework for Adaptive Programming Learning Using Educational Programming Features. 455-460 - Watcharaphong Yookwan, Athita Onuean, Sirapat Tansavetwong, Jirayus Arbking, Sirima Chinnasarn, Krisana Chinnasarn:

Automated Optical Marker Exam Recognition using Cross-Linear Area Detection from Smartphone Camera. 461-465 - Pattarapong Virojpakorn, Twittie Senivongse:

Software User Feedback Analysis Maturity for Software Maintenance. 466-471 - Hiroo Tsuji:

Enhancing Spatial Reasoning in Multimodal Vision-Language Models via Depth-Aware Feature Integration. 472-478 - Jirayus Arbking, Watcharaphong Yookwan, Nilrat Kanyunthong, Kriengsak Panphotong, Sithipong Chimthai, Krisana Chinnasarn:

TOI National Grader: A Support System for the Selection and Preparation of Thailand Informatics Olympiad Participants. 479-484 - Shinji Fukuma, Takuya Takazawa, Yoshiro Iwai:

An Image Based Evaluation of Coating of Eyeglass Frames by the i-MSE Method. 485-490 - Takumi Ito, Tomoya Kawakami:

Data Augmentation in Invalid User Detection Based on a Typing Speed of Individual Words. 491-496 - Jiraporn Ramjul, Twittie Senivongse:

Understanding User Experience Dimensions from Mobile Application User Reviews through Machine Learning. 497-502 - Amirreza Rouhbakhshmeghrazi

, Bo Li, Talha Munir Rana, Sheida Shadman, Shayan Nalbandian, Mohammad Reza Hassannezhad:
Exploring ConvNeXt and Vision Transformers for Classifying Messier Objects in Astronomical Images. 503-510 - Tatsuya Tohyama, Hideo Masuda:

A Fully Distributed WAN Virtualization Architecture with Self-Healing Function for Underlay Network Failures. 511-516 - Kazungu Ronald, Hideo Masuda:

A Proposal of Protection System for Home IoT network based on the awareness strategy. 517-523 - Hironori Shiotsuka, Atsushi Nunome

, Hiroaki Hirata:
Linked-List Construction Support by a Thread-Level Speculation Library. 524-531 - Kanemitsu Ootsu, Takumi Yanagida, Takashi Yokota, Takuma Kitamoto:

Performance Evaluation of Directive-Based Parallelized Code at LLVM-IR Level. 532-537 - Atsushi Nunome

, Hiroaki Hirata:
Compact Function-Based Modeling of Storage Throughput for an Autonomous Distributed Storage System. 538-545 - Seiha Uenishi, Shinji Fukuma, Shin-ichiro Mori:

Case studies on the real-time sonification of scientific data related to continuous flow phenomena. 546-550 - Ken Higuchi, Ryoji Kawamura:

Extendible Skip Graph Based on Order Preserving Linear Hashing. 551-556 - Fukuda Shota, Takuya Nakata, Sinan Chen, Sachio Saiki, Masahide Nakamura:

Evaluating the Effects of Private EMS Through Urgency-Aware Emergency Simulation. 557-562 - Atsunori Nishiyama, Takuya Nakata, Sinan Chen, Sachio Saiki, Masahide Nakamura:

Estimating Health Condition Using Facial Emotion Recognition. 563-568 - Catherine Francis Mangare, Hiroki Inayoshi, Akito Monden:

Analyzing the Combined Effects of Association Rules for Software Defect Prediction. 569-574 - Nahyun Kim, Akinori Matsukawa, Masahide Nakamura, Keiko Katagiri:

Mixed-Methods Integrating Machine Learning and Gerontology Using Real-World Data from Dialogues with Virtual Agent. 575-580 - Toshinori Shindo, Takuya Nakata, Sinan Chen, Sachio Saiki, Kiyoshi Yasuda, Masahide Nakamura:

Recognizing and Recording Grasped Objects for Assisting Elderly at Home to Find Missing Items. 581-586 - Zhaozhen Tong

, Sinan Chen, Yuko Yamaguchi, Masahide Nakamura, Hsin-Yen Yen, Shu-Chun Lee:
Assessing Elderly Physical Health Using Motor Function Variability and Bayesian Regression. 587-592 - Toya Kakimoto, Hiroki Inayoshi, Hidetake Uwano, Akito Monden:

Evaluating the Source Code Review Performance of LLM-based AI Chatbots. 593-600 - Sulin Chi, Tetsuya Shimamura:

Combination Approach for Distributed Blind Estimation over Sensor Network. 601-606 - Ryoya Okuno, Hiroki Nomiya, Koh Shimokawa, Shushi Namba, Masaki Osumi:

Emotion Estimation from Face Images by Integrating Action Unit and SFormer Features. 607-612 - Huu Huy Thinh Nguyen, Ikumi Noborio, Weiwei Du, Xuan Bach Mai, Makoto Muramoto, Eunjong Choi:

Custom Robot Arm-Based Trowel Direction Determination on Wall Corners using Deep Predictive Learning. 613-618 - Xiaozhong Xue, Kano Mizuno, Weiwei Du:

NAT-Unet Model for Optic Disc and Optic Cup Segmentation from Fundus Images. 619-624 - Hiroaki Tsukamoto, Motoi Iwashita:

Method of extracting regional characteristics from travel satisfaction. 625-630 - Takako Shirai, Kiyomi Miyoshi, Yasunobu Kino:

In Data Utilization of Enterprise Information Systems Construction of a Problem Generation Process Model. 631-638 - Ken Nishimatsu, Akiya Inoue:

Internet access and mobile service choice behavior analysis considering service change intention. 639-644 - Shota Kitabayashi, Toru Takagi, Yukihiro Shintani:

A Study on Individualized Learning Support for High School Mathematics by an Interactive AI Tutor : Educational Potential and Challenges in the Age of Large Language Models. 645-651 - Yuma Kawachi, Ion Yamauchi, Yukihiro Shintani, Toru Takagi:

Integrating Gamification into Decentralized Autonomous Organizations Management: A Survey-based Approach to Strategic Information Systems Governance. 652-657 - Thi Thuy Tien Tran, Xiaofan Wang:

Ethical Challenges in AI-based Clinical Decision Support System. 658-663 - Bo Huang, Fei Song:

Empirical Study of BERT-Based Models for Sentiment Analysis. 664-669 - Pranshu Patel, Aryan Vaghela, Aryan Patel, ANK Zaman, Lilatul Ferdouse

:
Using Synthetic Aperture Radar and Optical Satellite Data for Wildfire Detection: A Case Study. 670-675 - Tahmina Akhter

, Lilatul Ferdouse
:
Crime Pattern Detection in Toronto: A Focus on Theft from Motor Vehicles. 676-681 - Sathaporn Hu:

Chatbots as Turing Machines. 682-687 - Preyas Patel, Mohaisin Shahadu, Matthew Del, A. B. M. Bodrul Alam:

Optimizing Cloud Pricing Strategies Using AWS Simulations and Dockerization. 688-691 - Sujani Chandrashekar, Yang Liu:

Towards Safer Online Platforms: Explainable and Adversarial-Resistant Toxic Comment Detection. 692-697 - Sabiya Masthanali, Syed Muhammad Danish, Ajmery Sultana, Mahreen Nasir, Md Nashid Anjum, A. B. M. Bodrul Alam, Faria Khandaker:

Designing an AI-Driven Mobile Charging Station Network: Requirements and Opportunities. 698-703 - Ayomide E. Oduba, Christie I. Ezeife, Mahreen Nasir:

A Content Based E-Commerce Dataset Recommendation System Using BERT and Named Entity Recognition. 704-711 - Christine Wong, Abdulrauf Gidado, Kayode S. Adewole:

Privacy Preserving A-Priori and ECLAT with Local Differential Privacy. 712-717 - Parita Paneri, Md Nashid Anjum, Syed Muhammad Danish, Wafi Danesh:

Uninterrupted Internet Access: A Peer-to-Peer Alternative for Outage-Proof and Censorship-Resistant Communication. 718-724 - Maryam Sepehrinour, Alireza Siadatan, Seham Al Abdul Wahid, Farah A. Mohammadi, Arghavan Asad:

Reinforcement Learning-Driven Energy Optimization of Industrial Induction Motors under Dynamic Load Conditions. 725-728 - Shayan Mohammadi Gorji, Hamed Karimi, Alireza Siadatan, Maryam Sepehrinour, Rupinder Kaur, Seham Al Abdul Wahid, Farah A. Mohammadi, Arghavan Asad:

Increasing Power Transmission in Compact Low-Frequency Antenna Arrays through Active Negative Impedance Conversion. 729-733 - Ali Shahraeeni, Rupinder Kaur, Abbas Kochari, Farah A. Mohammadi, Arghavan Asad:

Empowering IoT with Large Language Models: A Survey of Applications, Challenges, and Future Directions. 734-739 - Lord Coffie, Mary Dufie Afrane

, Kwabena Opoku Frempong-Kore
, Jongyeop Kim:
Comparative Analysis of Machine Learning, Deep Learning, and Ensemble Models for Stroke Prediction Using Electronic Health Records. 740-747 - Isha Lad, Rutisha Patel, Ekta Patel, Rupinder Kaur, Arghavan Asad, Mahreen Nasir, Farah A. Mohammadi:

AI-Enabled Phishing Links Detection Using Machine Learning Models. 748-753 - Lord Coffie:

Modeling and Forecasting Train Delays Using Spatiotemporal Graph Neural Networks. 754-761 - Gurman Kaur, Faria Khandaker:

A Comparative Study of Task Offloading Approaches in the Edge-Cloud Paradigm. 762-765 - Vishwa Bhatt, Zhixin Yu, Divya Thakar, Jerry Cervantes-Fernandez, Mira Kim, Daniel Jin, Khalil Dajani, Jennifer Kim Jin:

Benchmarking Large Language Models: A Comparative Study of DeepSeek and ChatGPT Across Diverse Domains. 766-773 - Elli Traboulsi, Karim Imbeau, Yazan Otoum:

Peer-to-Peer Renewable Energy Trading Using Agent-Based Modelling. 774-781 - Ubaid Abbasi, Usama Mir, Zeeshan Ali Khan:

Resource Balancing and Energy Efficient Client Selection in Federated Learning for Mobile Edge Computing. 789-795 - Md. Moniruzzaman, Ajmery Sultana, Georges Kaddoum:

Peer-to-Peer Energy Trading in a Local Energy Market Using Quantum Reinforcement Learning. 796-801 - Md Nashid Anjum, Shamim Ahmed, Mahmudul Hasan, Wenjun Lin:

Cogniroot Edge: A Quest for A Fair AI Grader. 802-806 - Jikesh Thapa, Md Nashid Anjum, Rashid Hussain Khokhar:

Efficiency in Chat Application Encryption: A Comparative Review with Proposed Enhancements. 807-812 - Abraham Ighalo, Ajmery Sultana:

Quantum-Enhanced Data Analytics For Crime Prediction. 813-818 - Alá F. Khalifeh, Dhiah el Diehn I. Abou-Tair

:
Internet of Things Privacy Preserving Selected Encryption Framework. 819-823 - Fairouz Fakhfakh, Saoussen Cheikhrouhou, Slim Kallel

, Oumayma Jarray:
An NFT-based Blockchain Solution for Employee Skill Enhancement and Development. 824-829 - Shahroz Abbas, Ajmery Sultana, Mahreen Nasir, Miguel Garcia-Ruiz, Wenjun Lin:

Privacy-Preserving Machine Learning for Mental Health Prediction Using Homomorphic Encryption. 830-835 - Somang Nam, Christopher Chun Ki Chan:

Towards Designing User Interfaces for Optimized Human-AI Communication and Supervisory Control in Software Engineering. 836-841 - Yasser Ebrahim:

Making the Case for LLM-Generated Automated Program Repair Benchmarks. 842-847 - Md. Nadim Sheikh, Rashedur M. Rahman:

Entropy Regularization and Trade-off Strategies for Policy Gradient Agent Recommendation in Dhaka Stock Exchange Market. 848-855 - Jikesh Thapa, Gurrehmat Chahal, Serban Voinea Gabreanu, Yazan Otoum:

Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models. 856-863 - Mohammad F. Al-Hammouri, Yazan Otoum, Rasha Jamal Atwa, Amiya Nayak:

Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks. 864-869 - Maryam Sepehrinour, Alireza Siadatan, Seham Al Abdul Wahid, Farah A. Mohammadi, Arghavan Asad:

DeepNRSfPP: Learning-Based Real-Time Non-Rigid Structure-from-Perspective Projection. 870-873 - Amir Javad Mostafavi Nejad, Rupinder Kaur, Abbas Kochari, Farah A. Mohammadi, Arghavan Asad:

Integrating Matrix Factorization with Fair Re-Ranking for Improved Personalization in Recommender Systems. 874-879 - Ali Algumaei, Muhammad Azam, Nizar Bouguila:

Schizophrenia Detection using non-Orthogonal Adaptive Constrained Independent Vector Analysis with Multivariate Distribution. 880-886 - James Gu, Mahreen Nasir, Syed Muhammad Danish:

Personalizing E-Commerce by Optimizing LLMs for Tailored Product Recommendations. 887-892 - Sikder M. Kamruzzaman, Ishrat Z. Sikder:

Innovative Approaches to Cybersecurity Education: Tools and Strategies for Training the Next Generation of Professionals. 893-898 - Mitchell Petingola

:
Deep Learning-based Binary Analysis for Vulnerability Detection in x86-64 Machine Code. 899-906 - Tsega Weldu Araya

, Muhammad Azam, Nizar Bouguila, Jamal Bentahar:
Multivariate Bounded Support Kotz Mixture Model: Addressing Financial Fraud and Network Security Challenges. 907-912 - James Gu, Ahmed Sartaj, Mohammed Akram Taher Khan, Rashid Hussain Khokhar:

Design and Implementation of a Controlled Ransomware Framework for Educational Purposes Using Flutter Cryptographic APIs on Desktop PCs and Android Devices. 913-918 - Lien Tran, Boyuan Zhang, Ratchanon Pawanja, Rashid Hussain Khokhar:

The Passwordless Authentication with Passkey Technology from an Implementation Perspective. 919-924 - Jenifer Paulraj, Brindha Raghuraman, Nagarani Gopalakrishnan, Yazan Otoum:

Autonomous AI-based Cybersecurity Framework for Critical Infrastructure: Real-Time Threat Mitigation. 925-931 - Sanjana Shah, Gurmeet Chohan, Sabiya Masthanali, Syed Muhammad Danish, Yazan Otoum:

Advancing Zero Trust Security in Industrial IoT (IIoT): A Machine Learning Perspective. 932-937 - Yao Fu, Junpeng Gong, Pengzhou Zhang, Zhanxin Yang, Juan Cao:

DAHG: Heterogeneous Graph-Based Dual Attention for Emotion Recognition in Conversations. 938-943 - Hui Ren, Xian Zhu, Chengya Zhang, Zhen Li:

Inpainting of Figure Murals Based on a Dual-Branch Diffusion Model. 944-949 - Xinyi Qi, Linzhen Li, Xiaofang Jin:

Optimization of Neural Radiance Fields Rendering Quality via Hybrid Attention and Weighted Feature Distillation. 950-955 - Qian Liu, Jing Zhou, Xin Zhang:

Click-Through Rate Prediction via Graph-Augmented Behavioral Path Modeling. 956-963 - Qiyi Wei, Xin Zhang, Wenqian Shang:

DEG-Sum: Discourse-aware Event Graph Summarization for News Texts. 964-969 - David Shen, Wuwei Shen, Ioannis Nearchou:

A Framework to Support Over-The-Air Updates for Autonomous Driving Software. 970-976 - Abdulrazaq Mamud, Jongyeop Kim:

Evaluating One-Shot and Multi-Shot Prompting Strategies in a Transparent Educational Chatbot. 977-983 - Shayaree Subba, Muskan Girhotra, Md. Zamilur Rahman:

Understanding Depression and Suicide Through Words: Analyzing Reddit Posts with Topic Modelling. 984-991 - Ankush Choudhary, Ajmery Sultana, Thirumurugan Shanmugam, Rajakumar Arul, Arun Kumar Sivaraman:

Post-Quantum Secure Protocol for Confidential and Auditable Data Transmission. 992-997 - Mariam Merza, Uchechukwu Obinwanne, Wenying Feng:

Reducing Financial Debt and Illiteracy in Canadian Populations Using Machine Learning Prediction Models. 998-1000 - Dikshith Reddy Macherla, Uchechukwu Obinwanne, Wenying Feng:

Intraday Stock Price Prediction using Machine Learning: A Case Study on YFinance Stock Data. 1001-1006 - Noah Giacchetta, Uchechukwu Obinwanne, Wenying Feng:

Chess Game Outcome Prediction Using Machine Learning. 1007-1008 - Nafis Forkan, Md Towhidul Islam Rahat

, Yasef Ahnaf Shonon, Rashedur M. Rahman:
Stinger - An Asymmetric Multiplayer Serious Game for Dengue Awareness. 1009-1016 - Lord Coffie, Melvin Ajuluchukwu, Michael Nsor:

Predicting Numeric Financial KPIs From Unstructured Text: a Comparative Study of LLM-Based Embeddings and Traditional NLP Techniques. 1017-1022

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














