


default search action
15th UEMCON 2024: Yorktown Heights, NY, USA
- 15th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2024, Yorktown Heights, NY, USA, October 17-19, 2024. IEEE 2024, ISBN 979-8-3315-4090-6

- Md. Hasanuzzaman:

Lung Cancer Classification Optimization using CNN and Edge Detector from CT Scan Images. 1-6 - Yuan Xing, Zhiwei Zeng, Abhishek Verma, Cheng Liu, Tina Lee, Dongfang Hou, Haowen Pan, Sam Edwards, Wyatt Stehr:

Optimizing Grass Selection for Beef Cattle Using Multi-Armed Bandit Algorithms: A Data-Driven Approach to Enhance Growth Through Rumination Analysis. 7-12 - Kyle Stein, Alexander Harvey, Aylanna Lopez, Uzma Taj, Shari Watkins, Lanier A. Watkins:

Eliciting and Measuring Toxic Bias in Human-to-Machine Interactions in Large Language Models. 13-19 - Shivanjali Khare, Nahom H. Demoz, Ahmed Omar Salim Adnan:

Exploring the use of Machine-learning and Non-Radial DEA for Transit efficiency score prediction. 20-26 - Farshid Sahba, Amin Sahba, Ramin Sahba, Vahideh Hashempour:

A Model Based on Genetic Algorithm for Solving Polynomial Equations. 27-30 - Anujkumarsinh Donvir, Pradeep Kumar Saraswathi

, Apeksha Jain:
End-to-End Application and Backend State Management: A Comprehensive Review. 31-43 - Jerry Cao-Xue, Hongfang Zhang, Adam Stavola, Bence Budavari, Chiman Kwan, Hongyi Wu, Jiang Li:

Improved Radiation Estimation at High Energy Facility for Public Health. 44-50 - Jackie Wei, Hongfang Zhang, Adam Stavola, Bence Budavari, Chiman Kwan, Hongyi Wu, Jiang Li:

Optimizing Transformer-based Models for Radiation Estimation at High Energy Accelerator Facility. 51-57 - Yuan Xing, Abhishek Verma, Zhiwei Zeng, Cheng Liu, Tina Lee, Dongfang Hou, Haowen Pan, Sam Edwards:

Cluster-Based Genetic Algorithm Path Planning for Cooperative UGV and UAV Operations in Energy-efficient Wireless Sensor Networks. 58-65 - Yuan Xing, Zhiwei Zeng, Cheng Liu, Abhishek Verma, Tina Lee, Dongfang Hou, Haowen Pan, Sam Edwards:

Optimizing Sleep Schedules for Energy-Efficient Agricultural Wireless Sensor Networks Using Deep Reinforcement Learning. 66-72 - David Shilane, Ashwathi Prakash Nair:

Classification Models and Feature Engineering for Non-Intrusive Load Monitoring. 73-78 - Jay Ashok Shah, Nisha Ramesh Iyer:

Building Generative AI Chatbot Using Oracle Cloud Infrastructure. 79-84 - Nabonita Mitra, Ucchwas Talukder Utsha, Bashir I. Morshed:

Inkjet-printed Dry Flexible Electromyography Electrode Array for Classifying Finger Movements with AI Algorithms. 85-89 - Beatrice Low, Xindi Liu, Richard Z. Li, Elizabeth Ren, Jasmine X. Zhang:

Music Therapy for Autism Spectrum Disorder: A Comprehensive Literature Review on Therapeutic Efficacy, Limitations, and AI Integration. 90-99 - Jacob Hogrefe, Emilio Cruz, Chetan Jaiswal, Jose Riofrio:

AITracker: A neural network designed for efficient and affordable eye tracking. 100-107 - Amal O. Hamada

, Salwa Mohamed Hassan, Salma Samy
, Mohamed Azab, Efat Fathalla:
A Review: State-of-the-Art of Integrating AI Models with Moving-target Defense for Enhancing IoT Networks Security. 108-114 - Vahideh Hashempour, Ramin Sahba, Amin Sahba, Farshid Sahba:

AI-Driven Automated Measurement of Abdominal Aorta Diameter in CT Scan Images. 115-118 - Vaibhavi Tiwari

, Rahul Thakkar, Jiayin Wang:
DyRAM: Dynamic Data Allocation and Resource Management in Distributed Machine Learning Systems. 119-126 - Ahmed Omar Salim Adnan, Hosnara Happy, Sadia Alam Tumpa, Shivanjali Khare:

Predicting Audience Interests from Social Media Captions Using a Semi-Supervised Approach. 127-133 - Zuhair Tahat, Ayman Gharaibeh, Majd Z. Tahat, William B. Glisson, Hosam Alamleh, Xiyuan Liu:

Social Media Fake News Detection Using Machine Learning Models and Feature Extraction Techniques. 134-139 - Anujkumarsinh Donvir, Sriram Panyam

, Gunjan Paliwal, Praveen Gujar:
Accelerating Product Innovation: Impact of Serverless Computing and Generative AI on Application Development. 140-147 - Israt Ara, Brian Kelley:

Secure and Ultra-Reliable 6G IoT Algorithms with AI-Enhanced Shared Key Physical Layer Security. 148-157 - Rahat Bhatia, Sanmeet Kaur:

Development and Evaluation of a Smart Agricultural Chatbot. 158-163 - Aadi Deshmukh:

Utilizing Visual-Spatial Perception to Detect Drowning-induced Suffocation in Swimming Pools. 164-168 - Yusuf Usman

, Prashnna K. Gyawali, Sohan Gyawali
, Robin Chataut:
The Dark Side of AI: Large Language Models as Tools for Cyber Attacks on Vehicle Systems. 169-175 - Fatemeh Sarshartehrani, Anthony Lee, Mohamed Azab, Trenton Watkins, Denis Gracanin

:
Towards immersive cybersecurity workforce development for mission-critical IoT Systems. 176-182 - Vaibhavi Tiwari

, Dharshana Rajasekar, Jiayin Wang:
A Survey: Emerging Cybersecurity Threats in Driverless Cars. 183-189 - Luke Bassett, Maria Apostle, Federica Aveta:

High-Precision Robotic Arm for Silicon Wafer Handling and Alignment in Small-Scale Semiconductor Fabrication. 190-195 - Joseph Finkelstein, Teyi Tsai:

Remotely-Controlled Telerehabilitation in Virtual Reality Using IoT Architecture. 196-201 - Imran Ahmed, Misbah Ahmad:

Interpretable Deep Learning for Monkeypox Lesion Classification: A Study Using Model-Agnostic Explainability Techniques. 202-209 - Misbah Ahmad

, Wenhao Zhang, Melvyn L. Smith, Ben Brilot, Matt Bell:
IYOLO-FAM: Improved YOLOv8 with Feature Attention Mechanism for Cow Behaviour Detection. 210-219 - Imran Ahmed, Muftooh Ur Rehman Siddiqi

, Misbah Ahmad:
AI-Enhanced Visual Inspection Systems for Robust Detection of Product Packaging Defects in Manufacturing Environments. 220-225 - Robin Chataut, Yusuf Usman

, Chowdhury Mohammad Abid Rahman
, Sohan Gyawali
, Prashnna K. Gyawali:
Enhancing Phishing Detection with AI: A Novel Dataset and Comprehensive Analysis Using Machine Learning and Large Language Models. 226-232 - Matin Pirouz, Preston McCullough:

A Data-Centric Approach to Post-Pandemic Housing Market Analysis. 233-242 - Xiaoqing Fan, Xianghong Lin, Hao Liu:

Assessment of Water Conservation Function Based on Deep Autoencoder. 243-249 - Matin Pirouz:

Performance Comparison of Estimation Methods in Network Analysis. 250-256 - Louis B. Rosenberg, Hans Schumann, Christopher Dishop, Gregg Willcox, Anita Woolley, Ganesh Mani:

Conversational Swarms of Humans and AI Agents enable Hybrid Collaborative Decision-making. 257-263 - Majid Behravan

, Elham Mohammadrezaei, Mohamed Azab, Denis Gracanin
:
Multilingual Standalone Trustworthy Voice-Based Social Network for Disaster Situations. 264-270 - Andy Zheng, Mira Yun:

Affordable Self-Tuning Smart Queue Management for Home Networks. 271-277 - Junpeng Guo, Chunyi Peng:

Adaptive Tracking: Dynamic Frame Rate for Drone-Based Target Following. 278-285 - Arnab Mukherjee, David O. Johnson:

Enhanced Person Tracking with Metric-Based Learning and Diverse Detector Integration (DDI). 286-290 - Hiroshi Nonaka, Damian Valles:

Fully Auto-Regressive Multi-modal Large Language Model for Contextual Emotion Recognition. 291-299 - Swarnamouli Majumdar, Sonny E. Kirkley, Mayur Srivastava, Aamir Khan:

Enhancing Fire Safety with UAV Real-Time 3D Mapping and Hotspot Detection for Improved Emergency Response. 300-307 - Aakarsh Surendra, Kanika Sood, Craig Albuquerque, Shirin Akbar, Gourav Joshi, Pallavi Sakshi:

Revolutionizing Road Accident Analysis: A Deep Learning Approach to Entity Recognition and Extraction. 308-314 - Leo Kobayashi, Adewole Oyalowo, Uday Agrawal, Shyue-Ling Chen, John W. Gosbee, Xiao Hu, Kenneth A. Loparo, Gregory D. Jay, Derek Merck:

Implementation and Testing of an Experimental Near-Real-Time Patient Bedside Monitor Datastream Analysis and Alerting System in a Live Emergency Department. 315-322 - Mounika Sri Sai Apurva Nemalipuri, Dinesh Kothandaraman, Shivanjali Khare:

Hybrid CNN-LSTM Model for Jail Activity Recognition. 323-327 - Dane Richardson, Wei Hao:

An Empirical Study of Caching Impact on an AWS Hosted Website. 328-334 - Efat Fathalla, Youssef Azab:

Towards a Lightweight Self-Sovereign Identity Framework for IoT Network in a zero trust Environment. 335-341 - Nishar Miya, Rasib Khan, Preshika Basnet, Sajan Poudel:

InDeKX: A High Efficiency Intrusion Detection and Knowledge Exchange Architecture for Secure Edge Computing Services. 342-349 - Yanan Li, Xianghong Lin, Xiaoqing Fan:

Supervised Learning Algorithm for Deep Spiking Neural Networks Based on Instantaneous Error. 350-355 - Ahmed Imad Hammoodi Al-Jarah, Jorge Luis Ortega-Arjona:

A Parallel Steganography Algorithm Using a New Secret Key Generation. 356-365 - Milka C. I. Madahana

, John E. D. Ekoru:
Comparative Study of Machine Learning Algorithms for Student Retention, early warning and intervention systems for Institutions of Higher Learning. 366-371 - Kaan Icer

, Showrov Rahman
, Kaushallya Adhikari:
Autoregressive Modeling of Time Series in Renewable Energy Systems. 372-378 - John Reichenbach, Sherif Rashad:

Continuous Authentication of Smartphones using a Convolutional Neural Network Model. 385-391 - Nabonita Mitra, Moriom Rojy Momota, Bashir I. Morshed:

Detecting Various Hand Gestures from EMG Signals Using Inkjet-printed Dry Flexible Electrodes with Machine Learning Algorithms. 392-397 - Saurabh Kapoor:

Predicting Climate Change: A Linear Regression & Convex Optimization Approach. 398-403 - Rahul Vijaykumar, Sandip Purnapatra, Richard Plesh, Masudul Haider Imtiaz, Daqing Hou, Stephanie Schuckers:

Deepfake Attacks on Biometric Recognition: Evaluation of Resistance to Injection Attacks. 404-410 - Rahul Vijaykumar

, Sandip Purnapatra, Richard Plesh, Masudul Haider Imtiaz, Daqing Hou, Stephanie Schuckers:
Deepfake Attacks on Biometric Recognition: Evaluation of Resistance to Injection Attacks. 404-410 - Iain Nicholas Smith, Mohamad El-Hajj:

Fitting and Filtering Functional Data for Use in Video Data Analysis. 411-418 - Timothy C. Sweeney-Fanelli

, Ernesto Sola-Thomas, Naveenkumar G. Venkataswamy, Justin C. Au-Yeung, Masudul Haider Imtiaz:
Predicting Emotional States from Wearable ECG. 419-425 - Mann Patel, Heba Elgazzar:

Pedestrian Crosswalk Safety at Intersections using YOLOv8 Detection. 426-430 - Hariharan Govindharajan, Senthilkumar Vijayakumar

:
A Framework for automated selective Fine-Tuning of Domain-Specific Large Language Models Using Graph-Based Retrieval Augmented Generation. 431-439 - Mohammad Zubair Khan

, David Li:
Dynamic Logistic Ensembles with Recursive Probability and Automatic Subset Splitting for Enhanced Binary Classification. 440-447 - Te-Yi Tsai, Aref Smiley, Joseph Finkelstein:

Using Fitbit to Implement Personalized Walking Programs in Older Adults. 448-453 - Casimer DeCusatis, Evan Spillane, Dominick Foti, Megan O'Loughlin:

Comparison of quantum computing algorithms for network traffic partitioning and mitigation of DoS and DDoS attacks. 454-460 - Hayin Tamut, Indira Kalyan Dutta:

Understanding and Mitigating Social Engineering Attacks to Elderly People: A Comprehensive Survey of Methods, Impacts, and Future Solutions. 461-470 - Nevzat U. Demirseren, Iman Vakilinia:

Adaptive Row Activation and Refresh a Hybrid Approach to Mitigate RowHammer. 471-476 - Md Liakat Ali, Kutub Thakur, Helen Barker, Michael Chan:

The Rise of Artificial Intelligence: Industry Insights and Applications in Security Information and Event Management (SIEM). 477-482 - Hosam Alamleh, Laura Estremera:

System for Detecting and Jamming Unauthorized Communications Using RF-SDR. 483-487 - Chinmayi Goyal:

Towards User-Driven Exoskeletal Assistive Control using Deep Reinforcement Learning. 488-494 - Md. Shihab Uddin, Mohd Ariful Haque, Rakib Hossain Rifat, Marufa Kamal, Kishor Datta Gupta, Roy George:

Bangla SBERT - Sentence Embedding Using Multilingual Knowledge Distillation. 495-500 - Arzu Susoglu, Khaled Elleithy:

Video Steganography Algorithm Defining the ROI using Haar-Like Features and Convolutional Neural Network. 501-505 - Hard Rakesh Shah, Brian Haley, Eman Abdelfattah:

Application of Machine Learning Models for Predictive Analytics on AI4I 2020. 506-511 - Hosam Alamleh, Laura Estremera:

Securing Mobile Finance: Trends, Mitigations, and Best Practice. 512-516 - Hossein Siadati, Sima Jafarikhah, Elif Sahin, Terrence Brent Hernandez, Elijah Lorenzo Tripp, Denis Khryashchev, Amin Kharraz:

DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers. 517-523 - Tristan Digert, Majd Safi, Eric B. Clark, Tarek A. Idriss:

Anonymous Messaging for IoT and Cloud Security Using PUF-Based Protocols: A Lightweight Alternative to SSL. 524-530 - Jobin Joseph, Ramone Bolton, Constantin Filiuta, Chris Danetti, Supriyo Karmakar:

Emergency Wireless Chatting Using RF. 531-535 - Sandhya Aneja, Nagender Aneja

:
Fingerprinting Browsers in Encrypted Communications. 536-538 - Mohammad Shah Alamgir, Brian Kelley:

6G Vision-Intelligent Millimeter-Wave Systems on High-Altitude Platform Stations. 539-547 - Ayesha A. Malik

, Abrar M. Zaki, Ngoc Chung Tran, Irene X. Liang, Ting Liu, Damian Valles:
Virtual Reality on Assessing the Motor Skills of Individuals with Autism Spectrum Disorder. 548-555 - Shafiqul Alam Khan

, Damian Valles:
Deepfake Detection Using Transfer Learning. 556-562 - Albert H. Carlson, Benjamin Williams, Sai Ranganath Mikkilineni:

Is Everlasting Security Necessary? 563-569 - Amna Mazen

, Weiming Chen, Wenting Wei, Daojun Teng, Mariam Faied:
An Interactive Robotic System for Efficient Book Borrowing and Returning in a Library Environment. 570-575 - Belinda Truong, Brian Nolasco-Ramirez, Sophia Sistachs, Sophia Puga, Ryan Ballard, Mackeen Al-Hiraky, Shauib Ibraheem, Isaiah Alleyne, Saurav M. S. Basnet:

RoboRuggles: Design of a Combat Robot. 576-580 - Nguyen Ho, Zaid Fafouri, Austin Gregory, Michael Okwori

:
Towards A Minimalistic Sensor-Based Smart Soccer Net With Machine Learning. 581-586 - L. David Aites, David E. Stewart:

Supervised Learning with Informed Graph Convolution. 587-592 - Maya Nachega, Sugru A. Yahaya, Ila Wallace

, Ting Liu, Damian Valles, Rachel M. Koldenhoven, Yumen Li:
Enhancing Early Diagnosis of Autism With Machine Learning Algorithms Using Postural Control Features. 593-598 - Finian Lugtigheid, Andrew J. Park, Eunju Hwang, Valerie Spicer, Patricia L. Brantingham:

Sidewalk-Based Accessible Pedestrian Routing. 599-604 - Larry Emerson Johnson, Sherif Rashad:

An Innovative System for Real-Time Translation from American Sign Language (ASL) to Spoken English using a Large Language Model (LLM). 605-611 - Praveen Kuruvangi Parameshwara, Shilpa Gupta:

Intelligent Automation of SFO Crime Prediction using Multiple Artificial Intelligence Methods. 612-619 - Federica Aveta, Logan M. Cabral, Tj Colville, Adam F. Gonneville, Tedi Qafko, Saurav M. S. Basnet:

Achieving Net-Zero for 555 Huntington Avenue. 620-625 - Wookwon Lee, Keegan J. McCann, Nicholas A. Nagy, Joseph L. Kvortek, Christopher P. Petteys, Joshua A. Hicks, Damien T. Chu:

A Small-Scale Intra-IoT Network Prototype for Centralized Monitoring of CPS/IoT Devices on Isolated Intranets. 626-630 - Tedi Qafko, Patrick Blanchard, Quang Vu, Federica Aveta:

Object Tracking Spherical Underwater Sensing Robot. 631-635 - Rajarshi Mukherjee

, Mohamed Azab, Thidapat Chantem
:
Enabling Moving Target Defense for Real-Time CPS Security. 636-642 - Pravir Malik, Arjun Subedi:

Enhancing Abstraction in Large Language Models Through Nature-Inspired Semantic Patterns. 643-649 - Trung T. Nguyen

, Amartya Hatua:
Effects of Common Sense and Supporting Texts for the Important Words in Solving Text Entailment Tasks - A Study on the e-SNLI Dataset. 650-655 - Nizar Tayem, Austin Burns, Kameron Hansen, Sam Pearson, Noah Blount, David Reyes, Ahmed A. Hussain:

Hardware Implementation of Real-Time 2D DOA Estimation Algorithm Using an L-Shaped Array. 656-661 - Supriyo Karmakar:

Future non-volatile memory for semiconductor industry. 662-666 - Kushal Kalyan Devalampeta Surendranath, Maxwell Sam

, Letu Qingge:
An Adaptive Dropout and Parallel Computing Approaches for Accelerating RNN Controller. 667-675 - Rasika Nilaweera Kalahe-Wattege, Fernando Beltrán, Jairo A. Gutiérrez:

Interference-Limits Aware Power and Receiver Optimization for 5G NR-U and Wi-Fi in the 6 GHz Shared-Spectrum. 676-682 - Sayeem Md. Abdullah

, Md. Sami Uddin:
Revisiting FastTap: Effects of Increasing Command Capacity of Spatial Memory Menus in Tablets. 683-689 - Hemant Purohit

, Siddhartha Bhattacharyya:
MBSE for Contingency Planning for Cellular Networks with OPM. 690-697 - Noureddine Chabini, Marilyn Claire Wolf, Rachid Beguenane:

LUT-Based Multipliers for IEEE-754 Floating Point Arithmetic on FPGAs. 698-701 - R. G. H. S. Rajapaksha

, D. C. Gonapoladeniya, H. H. S. Peiris, H. P. N. S. Siriwardana, N. D. U. Gamage, K. T. S. Kasthuriarachchi:
WingsSL: Integrated Approach for the Detection and Conservation of Birds in Sri Lanka. 702-708 - B. L. H. Peiris D, J. P. A. S. Pathmendre, A. R. W. M. Hasaranga V, A. M. I. R. Athauda B, Kanishka Yapa, Samadhi Rathnayake:

CodeNexa: A Novel Security Framework for Federated Learning to Mitigate Man-in-the-Middle Attacks. 709-714 - Dinh Xuan Truong

, Tien-Dung Do:
Graph-Based Ranking Techniques for Improving VLSI Placement. 715-719 - Sultan Ahmed Almalki:

Optimizing Breast Cancer Classification with Ensemble Methods: A Focus on Bagging Techniques. 720-723 - Cade Parlato, Neil Loftus, Sam McGrath, Husnu S. Narman, Rick Gage:

Remote Estimation of Above Ground Forest Biomass Using LiDAR and Drone Imagery. 724-729 - Arun Prasad Jaganathan, Shadi Khan Baloch

:
Performance Analysis of Machine Learning Models for Predicting Order Process Management. 730-736 - Raul Oswaldo Meza Torres, Anthony Jesus Hinostroza Flores, Luis Enrique Soto Otivo, Sario Angel Chamorro Quijano, Roberto Belarmino Quispe Cabana:

Design of a Machine for the Production of Advanced Fabrics. 737-742 - Ali Mohammadi

, Ali Soleimani
, Shamsad Parvin:
Dynamic Strategy Optimizer (DSO): Application In Enhancing New User Engagement in Hybrid Recommender System. 750-756 - Tarun Reddi

, Charvi Kusuma, Shamsad Parvin:
Mapping Crime Dynamics: Integrating Textual, Spatial, and Temporal Perspectives. 757-763 - Lizeth Carrillo-Mancilla, Luis Rizo Domínguez:

Maximum likelihood estimator for Zipf distribution: a new approach. 764-770 - Sagar Pathak, Dipankar Dasgupta:

Federated Learning with Authenticated Clients. 771-780 - Peizhi Yan, Tala Talaei Khoei, Reena Sajad Hyder, Reemaa Sajad Hyder:

A Dual-Stage Ensemble Approach to Detect and Classify Ransomware Attacks. 781-786 - Eric Zabala, Husnu S. Narman:

Development and Evaluation of an AI-Enhanced Python Programming Education System. 787-792 - Ocheme Anthony Ekle

, Denis A. Ulybyshev:
Enhanced Categorization of Cybersecurity Vulnerabilities. 800-806 - Rahul Vijaykumar, Sandip Purnapatra, Richard Plesh, Masudul Haider Imtiaz, Daqing Hou, Stephanie Schuckers:

Deepfake Attacks on Biometric Recognition: Evaluation of Resistance to Injection Attacks. 404-410 - Saket Kumar, Abul Ehtesham, Aditi Singh, Tala Talaei Khoei:

Architectural Flaw Detection in Civil Engineering Using GPT-4. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














