default search action
15th UEMCON 2024: Yorktown Heights, NY, USA
- 15th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2024, Yorktown Heights, NY, USA, October 17-19, 2024. IEEE 2024, ISBN 979-8-3315-4090-6
- Md. Hasanuzzaman:
Lung Cancer Classification Optimization using CNN and Edge Detector from CT Scan Images. 1-6 - Yuan Xing, Zhiwei Zeng, Abhishek Verma, Cheng Liu, Tina Lee, Dongfang Hou, Haowen Pan, Sam Edwards, Wyatt Stehr:
Optimizing Grass Selection for Beef Cattle Using Multi-Armed Bandit Algorithms: A Data-Driven Approach to Enhance Growth Through Rumination Analysis. 7-12 - Kyle Stein, Alexander Harvey, Aylanna Lopez, Uzma Taj, Shari Watkins, Lanier A. Watkins:
Eliciting and Measuring Toxic Bias in Human-to-Machine Interactions in Large Language Models. 13-19 - Shivanjali Khare, Nahom H. Demoz, Ahmed Omar Salim Adnan:
Exploring the use of Machine-learning and Non-Radial DEA for Transit efficiency score prediction. 20-26 - Farshid Sahba, Amin Sahba, Ramin Sahba, Vahideh Hashempour:
A Model Based on Genetic Algorithm for Solving Polynomial Equations. 27-30 - Anujkumarsinh Donvir, Pradeep Kumar Saraswathi, Apeksha Jain:
End-to-End Application and Backend State Management: A Comprehensive Review. 31-43 - Jerry Cao-Xue, Hongfang Zhang, Adam Stavola, Bence Budavari, Chiman Kwan, Hongyi Wu, Jiang Li:
Improved Radiation Estimation at High Energy Facility for Public Health. 44-50 - Jackie Wei, Hongfang Zhang, Adam Stavola, Bence Budavari, Chiman Kwan, Hongyi Wu, Jiang Li:
Optimizing Transformer-based Models for Radiation Estimation at High Energy Accelerator Facility. 51-57 - Yuan Xing, Abhishek Verma, Zhiwei Zeng, Cheng Liu, Tina Lee, Dongfang Hou, Haowen Pan, Sam Edwards:
Cluster-Based Genetic Algorithm Path Planning for Cooperative UGV and UAV Operations in Energy-efficient Wireless Sensor Networks. 58-65 - Yuan Xing, Zhiwei Zeng, Cheng Liu, Abhishek Verma, Tina Lee, Dongfang Hou, Haowen Pan, Sam Edwards:
Optimizing Sleep Schedules for Energy-Efficient Agricultural Wireless Sensor Networks Using Deep Reinforcement Learning. 66-72 - David Shilane, Ashwathi Prakash Nair:
Classification Models and Feature Engineering for Non-Intrusive Load Monitoring. 73-78 - Jay Ashok Shah, Nisha Ramesh Iyer:
Building Generative AI Chatbot Using Oracle Cloud Infrastructure. 79-84 - Nabonita Mitra, Ucchwas Talukder Utsha, Bashir I. Morshed:
Inkjet-printed Dry Flexible Electromyography Electrode Array for Classifying Finger Movements with AI Algorithms. 85-89 - Beatrice Low, Xindi Liu, Richard Z. Li, Elizabeth Ren, Jasmine X. Zhang:
Music Therapy for Autism Spectrum Disorder: A Comprehensive Literature Review on Therapeutic Efficacy, Limitations, and AI Integration. 90-99 - Jacob Hogrefe, Emilio Cruz, Chetan Jaiswal, Jose Riofrio:
AITracker: A neural network designed for efficient and affordable eye tracking. 100-107 - Amal O. Hamada, Salwa Mohamed Hassan, Salma Samy, Mohamed Azab, Efat Fathalla:
A Review: State-of-the-Art of Integrating AI Models with Moving-target Defense for Enhancing IoT Networks Security. 108-114 - Vahideh Hashempour, Ramin Sahba, Amin Sahba, Farshid Sahba:
AI-Driven Automated Measurement of Abdominal Aorta Diameter in CT Scan Images. 115-118 - Vaibhavi Tiwari, Rahul Thakkar, Jiayin Wang:
DyRAM: Dynamic Data Allocation and Resource Management in Distributed Machine Learning Systems. 119-126 - Ahmed Omar Salim Adnan, Hosnara Happy, Sadia Alam Tumpa, Shivanjali Khare:
Predicting Audience Interests from Social Media Captions Using a Semi-Supervised Approach. 127-133 - Zuhair Tahat, Ayman Gharaibeh, Majd Z. Tahat, William B. Glisson, Hosam Alamleh, Xiyuan Liu:
Social Media Fake News Detection Using Machine Learning Models and Feature Extraction Techniques. 134-139 - Anujkumarsinh Donvir, Sriram Panyam, Gunjan Paliwal, Praveen Gujar:
Accelerating Product Innovation: Impact of Serverless Computing and Generative AI on Application Development. 140-147 - Israt Ara, Brian Kelley:
Secure and Ultra-Reliable 6G IoT Algorithms with AI-Enhanced Shared Key Physical Layer Security. 148-157 - Rahat Bhatia, Sanmeet Kaur:
Development and Evaluation of a Smart Agricultural Chatbot. 158-163 - Aadi Deshmukh:
Utilizing Visual-Spatial Perception to Detect Drowning-induced Suffocation in Swimming Pools. 164-168 - Yusuf Usman, Prashnna K. Gyawali, Sohan Gyawali, Robin Chataut:
The Dark Side of AI: Large Language Models as Tools for Cyber Attacks on Vehicle Systems. 169-175 - Fatemeh Sarshartehrani, Anthony Lee, Mohamed Azab, Trenton Watkins, Denis Gracanin:
Towards immersive cybersecurity workforce development for mission-critical IoT Systems. 176-182 - Vaibhavi Tiwari, Dharshana Rajasekar, Jiayin Wang:
A Survey: Emerging Cybersecurity Threats in Driverless Cars. 183-189 - Luke Bassett, Maria Apostle, Federica Aveta:
High-Precision Robotic Arm for Silicon Wafer Handling and Alignment in Small-Scale Semiconductor Fabrication. 190-195 - Joseph Finkelstein, Teyi Tsai:
Remotely-Controlled Telerehabilitation in Virtual Reality Using IoT Architecture. 196-201 - Imran Ahmed, Misbah Ahmad:
Interpretable Deep Learning for Monkeypox Lesion Classification: A Study Using Model-Agnostic Explainability Techniques. 202-209 - Misbah Ahmad, Wenhao Zhang, Melvyn L. Smith, Ben Brilot, Matt Bell:
IYOLO-FAM: Improved YOLOv8 with Feature Attention Mechanism for Cow Behaviour Detection. 210-219 - Imran Ahmed, Muftooh Ur Rehman Siddiqi, Misbah Ahmad:
AI-Enhanced Visual Inspection Systems for Robust Detection of Product Packaging Defects in Manufacturing Environments. 220-225 - Robin Chataut, Yusuf Usman, Chowdhury Mohammad Abid Rahman, Sohan Gyawali, Prashnna K. Gyawali:
Enhancing Phishing Detection with AI: A Novel Dataset and Comprehensive Analysis Using Machine Learning and Large Language Models. 226-232 - Matin Pirouz, Preston McCullough:
A Data-Centric Approach to Post-Pandemic Housing Market Analysis. 233-242 - Xiaoqing Fan, Xianghong Lin, Hao Liu:
Assessment of Water Conservation Function Based on Deep Autoencoder. 243-249 - Matin Pirouz:
Performance Comparison of Estimation Methods in Network Analysis. 250-256 - Louis B. Rosenberg, Hans Schumann, Christopher Dishop, Gregg Willcox, Anita Woolley, Ganesh Mani:
Conversational Swarms of Humans and AI Agents enable Hybrid Collaborative Decision-making. 257-263 - Majid Behravan, Elham Mohammadrezaei, Mohamed Azab, Denis Gracanin:
Multilingual Standalone Trustworthy Voice-Based Social Network for Disaster Situations. 264-270 - Andy Zheng, Mira Yun:
Affordable Self-Tuning Smart Queue Management for Home Networks. 271-277 - Junpeng Guo, Chunyi Peng:
Adaptive Tracking: Dynamic Frame Rate for Drone-Based Target Following. 278-285 - Arnab Mukherjee, David O. Johnson:
Enhanced Person Tracking with Metric-Based Learning and Diverse Detector Integration (DDI). 286-290 - Hiroshi Nonaka, Damian Valles:
Fully Auto-Regressive Multi-modal Large Language Model for Contextual Emotion Recognition. 291-299 - Swarnamouli Majumdar, Sonny Kirkley, Mayur Srivastava, Aamir Khan:
Enhancing Fire Safety with UAV Real-Time 3D Mapping and Hotspot Detection for Improved Emergency Response. 300-307 - Aakarsh Surendra, Kanika Sood, Craig Albuquerque, Shirin Akbar, Gourav Joshi, Pallavi Sakshi:
Revolutionizing Road Accident Analysis: A Deep Learning Approach to Entity Recognition and Extraction. 308-314 - Leo Kobayashi, Adewole Oyalowo, Uday Agrawal, Shyue-Ling Chen, John W. Gosbee, Xiao Hu, Kenneth A. Loparo, Gregory D. Jay, Derek Merck:
Implementation and Testing of an Experimental Near-Real-Time Patient Bedside Monitor Datastream Analysis and Alerting System in a Live Emergency Department. 315-322 - Mounika Sri Sai Apurva Nemalipuri, Dinesh Kothandaraman, Shivanjali Khare:
Hybrid CNN-LSTM Model for Jail Activity Recognition. 323-327 - Dane Richardson, Wei Hao:
An Empirical Study of Caching Impact on an AWS Hosted Website. 328-334 - Efat Fathalla, Youssef Azab:
Towards a Lightweight Self-Sovereign Identity Framework for IoT Network in a zero trust Environment. 335-341 - Nishar Miya, Rasib Khan, Preshika Basnet, Sajan Poudel:
InDeKX: A High Efficiency Intrusion Detection and Knowledge Exchange Architecture for Secure Edge Computing Services. 342-349 - Yanan Li, Xianghong Lin, Xiaoqing Fan:
Supervised Learning Algorithm for Deep Spiking Neural Networks Based on Instantaneous Error. 350-355 - Ahmed Imad Hammoodi Al-Jarah, Jorge Luis Ortega-Arjona:
A Parallel Steganography Algorithm Using a New Secret Key Generation. 356-365 - Milka C. I. Madahana, John E. D. Ekoru:
Comparative Study of Machine Learning Algorithms for Student Retention, early warning and intervention systems for Institutions of Higher Learning. 366-371 - Kaan Icer, Showrov Rahman, Kaushallya Adhikari:
Autoregressive Modeling of Time Series in Renewable Energy Systems. 372-378 - John Reichenbach, Sherif Rashad:
Continuous Authentication of Smartphones using a Convolutional Neural Network Model. 385-391 - Nabonita Mitra, Moriom Rojy Momota, Bashir I. Morshed:
Detecting Various Hand Gestures from EMG Signals Using Inkjet-printed Dry Flexible Electrodes with Machine Learning Algorithms. 392-397 - Saurabh Kapoor:
Predicting Climate Change: A Linear Regression & Convex Optimization Approach. 398-403 - Rahul Vijaykumar, Sandip Purnapatra, Richard Plesh, Masudul H. Imtiaz, Daqing Hou, Stephanie Schuckers:
Deepfake Attacks on Biometric Recognition: Evaluation of Resistance to Injection Attacks. 404-410 - Rahul Vijaykumar, Sandip Purnapatra, Richard Plesh, Masudul H. Imtiaz, Daqing Hou, Stephanie Schuckers:
Deepfake Attacks on Biometric Recognition: Evaluation of Resistance to Injection Attacks. 404-410 - Iain Nicholas Smith, Mohamad El-Hajj:
Fitting and Filtering Functional Data for Use in Video Data Analysis. 411-418 - Timothy C. Sweeney-Fanelli, Ernesto Sola-Thomas, Naveenkumar G. Venkataswamy, Justin C. Au-Yeung, Masudul H. Imtiaz:
Predicting Emotional States from Wearable ECG. 419-425 - Mann Patel, Heba Elgazzar:
Pedestrian Crosswalk Safety at Intersections using YOLOv8 Detection. 426-430 - Hariharan Govindharajan, Senthilkumar Vijayakumar:
A Framework for automated selective Fine-Tuning of Domain-Specific Large Language Models Using Graph-Based Retrieval Augmented Generation. 431-439 - Mohammad Zubair Khan, David Li:
Dynamic Logistic Ensembles with Recursive Probability and Automatic Subset Splitting for Enhanced Binary Classification. 440-447 - Te-Yi Tsai, Aref Smiley, Joseph Finkelstein:
Using Fitbit to Implement Personalized Walking Programs in Older Adults. 448-453 - Casimer DeCusatis, Evan Spillane, Dominick Foti, Megan O'Loughlin:
Comparison of quantum computing algorithms for network traffic partitioning and mitigation of DoS and DDoS attacks. 454-460 - Hayin Tamut, Indira Kalyan Dutta:
Understanding and Mitigating Social Engineering Attacks to Elderly People: A Comprehensive Survey of Methods, Impacts, and Future Solutions. 461-470 - Nevzat U. Demirseren, Iman Vakilinia:
Adaptive Row Activation and Refresh a Hybrid Approach to Mitigate RowHammer. 471-476 - Md Liakat Ali, Kutub Thakur, Helen Barker, Michael Chan:
The Rise of Artificial Intelligence: Industry Insights and Applications in Security Information and Event Management (SIEM). 477-482 - Hosam Alamleh, Laura Estremera:
System for Detecting and Jamming Unauthorized Communications Using RF-SDR. 483-487 - Chinmayi Goyal:
Towards User-Driven Exoskeletal Assistive Control using Deep Reinforcement Learning. 488-494 - Md. Shihab Uddin, Mohd Ariful Haque, Rakib Hossain Rifat, Marufa Kamal, Kishor Datta Gupta, Roy George:
Bangla SBERT - Sentence Embedding Using Multilingual Knowledge Distillation. 495-500 - Arzu Susoglu, Khaled Elleithy:
Video Steganography Algorithm Defining the ROI using Haar-Like Features and Convolutional Neural Network. 501-505 - Hard Rakesh Shah, Brian Haley, Eman Abdelfattah:
Application of Machine Learning Models for Predictive Analytics on AI4I 2020. 506-511 - Hosam Alamleh, Laura Estremera:
Securing Mobile Finance: Trends, Mitigations, and Best Practice. 512-516 - Hossein Siadati, Sima Jafarikhah, Elif Sahin, Terrence Brent Hernandez, Elijah Lorenzo Tripp, Denis Khryashchev, Amin Kharraz:
DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers. 517-523 - Tristan Digert, Majd Safi, Eric B. Clark, Tarek A. Idriss:
Anonymous Messaging for IoT and Cloud Security Using PUF-Based Protocols: A Lightweight Alternative to SSL. 524-530 - Jobin Joseph, Ramone Bolton, Constantin Filiuta, Chris Danetti, Supriyo Karmakar:
Emergency Wireless Chatting Using RF. 531-535 - Sandhya Aneja, Nagender Aneja:
Fingerprinting Browsers in Encrypted Communications. 536-538 - Mohammad Shah Alamgir, Brian Kelley:
6G Vision-Intelligent Millimeter-Wave Systems on High-Altitude Platform Stations. 539-547 - Ayesha A. Malik, Abrar M. Zaki, Ngoc Chung Tran, Irene X. Liang, Ting Liu, Damian Valles:
Virtual Reality on Assessing the Motor Skills of Individuals with Autism Spectrum Disorder. 548-555 - Shafiqul Alam Khan, Damian Valles:
Deepfake Detection Using Transfer Learning. 556-562 - Albert H. Carlson, Benjamin Williams, Sai Ranganath Mikkilineni:
Is Everlasting Security Necessary? 563-569 - Amna Mazen, Weiming Chen, Wenting Wei, Daojun Teng, Mariam Faied:
An Interactive Robotic System for Efficient Book Borrowing and Returning in a Library Environment. 570-575 - Belinda Truong, Brian Nolasco-Ramirez, Sophia Sistachs, Sophia Puga, Ryan Ballard, Mackeen Al-Hiraky, Shauib Ibraheem, Isaiah Alleyne, Saurav Basnet:
RoboRuggles: Design of a Combat Robot. 576-580 - Nguyen Ho, Zaid Fafouri, Austin Gregory, Michael Okwori:
Towards A Minimalistic Sensor-Based Smart Soccer Net With Machine Learning. 581-586 - L. David Aites, David E. Stewart:
Supervised Learning with Informed Graph Convolution. 587-592 - Maya Nachega, Sugru A. Yahaya, Ila Wallace, Ting Liu, Damian Valles, Rachel M. Koldenhoven, Yumen Li:
Enhancing Early Diagnosis of Autism With Machine Learning Algorithms Using Postural Control Features. 593-598 - Finian Lugtigheid, Andrew J. Park, Eunju Hwang, Valerie Spicer, Patricia L. Brantingham:
Sidewalk-Based Accessible Pedestrian Routing. 599-604 - Larry Emerson Johnson, Sherif Rashad:
An Innovative System for Real-Time Translation from American Sign Language (ASL) to Spoken English using a Large Language Model (LLM). 605-611 - Praveen Kuruvangi Parameshwara, Shilpa Gupta:
Intelligent Automation of SFO Crime Prediction using Multiple Artificial Intelligence Methods. 612-619 - Federica Aveta, Logan M. Cabral, Tj Colville, Adam F. Gonneville, Tedi Qafko, Saurav Basnet:
Achieving Net-Zero for 555 Huntington Avenue. 620-625 - Wookwon Lee, Keegan J. McCann, Nicholas A. Nagy, Joseph L. Kvortek, Christopher P. Petteys, Joshua A. Hicks, Damien T. Chu:
A Small-Scale Intra-IoT Network Prototype for Centralized Monitoring of CPS/IoT Devices on Isolated Intranets. 626-630 - Tedi Qafko, Patrick Blanchard, Quang Vu, Federica Aveta:
Object Tracking Spherical Underwater Sensing Robot. 631-635 - Rajarshi Mukherjee, Mohamed Azab, Thidapat Chantem:
Enabling Moving Target Defense for Real-Time CPS Security. 636-642 - Pravir Malik, Arjun Subedi:
Enhancing Abstraction in Large Language Models Through Nature-Inspired Semantic Patterns. 643-649 - Trung T. Nguyen, Amartya Hatua:
Effects of Common Sense and Supporting Texts for the Important Words in Solving Text Entailment Tasks - A Study on the e-SNLI Dataset. 650-655 - Nizar Tayem, Austin Burns, Kameron Hansen, Sam Pearson, Noah Blount, David Reyes, Ahmed A. Hussain:
Hardware Implementation of Real-Time 2D DOA Estimation Algorithm Using an L-Shaped Array. 656-661 - Supriyo Karmakar:
Future non-volatile memory for semiconductor industry. 662-666 - Kushal Kalyan Devalampeta Surendranath, Maxwell Sam, Letu Qingge:
An Adaptive Dropout and Parallel Computing Approaches for Accelerating RNN Controller. 667-675 - Rasika Nilaweera Kalahe-Wattege, Fernando Beltrán, Jairo A. Gutiérrez:
Interference-Limits Aware Power and Receiver Optimization for 5G NR-U and Wi-Fi in the 6 GHz Shared-Spectrum. 676-682 - Sayeem Md. Abdullah, Md. Sami Uddin:
Revisiting FastTap: Effects of Increasing Command Capacity of Spatial Memory Menus in Tablets. 683-689 - Hemant Purohit, Siddhartha Bhattacharyya:
MBSE for Contingency Planning for Cellular Networks with OPM. 690-697 - Noureddine Chabini, Marilyn Claire Wolf, Rachid Beguenane:
LUT-Based Multipliers for IEEE-754 Floating Point Arithmetic on FPGAs. 698-701 - R. G. H. S. Rajapaksha, D. C. Gonapoladeniya, H. H. S. Peiris, H. P. N. S. Siriwardana, N. D. U. Gamage, K. T. S. Kasthuriarachchi:
WingsSL: Integrated Approach for the Detection and Conservation of Birds in Sri Lanka. 702-708 - B. L. H. Peiris D, J. P. A. S. Pathmendre, A. R. W. M. Hasaranga V, A. M. I. R. Athauda B, Kanishka Yapa, Samadhi Rathnayake:
CodeNexa: A Novel Security Framework for Federated Learning to Mitigate Man-in-the-Middle Attacks. 709-714 - Truong Xuan Dinh, Tien-Dung Do:
Graph-Based Ranking Techniques for Improving VLSI Placement. 715-719 - Sultan Ahmed Almalki:
Optimizing Breast Cancer Classification with Ensemble Methods: A Focus on Bagging Techniques. 720-723 - Cade Parlato, Neil Loftus, Sam McGrath, Husnu S. Narman, Rick Gage:
Remote Estimation of Above Ground Forest Biomass Using LiDAR and Drone Imagery. 724-729 - Arun Prasad Jaganathan, Shadi Khan Baloch:
Performance Analysis of Machine Learning Models for Predicting Order Process Management. 730-736 - Raul Oswaldo Meza Torres, Anthony Jesus Hinostroza Flores, Luis Enrique Soto Otivo, Sario Angel Chamorro Quijano, Roberto Belarmino Quispe Cabana:
Design of a Machine for the Production of Advanced Fabrics. 737-742 - Ali Mohammadi, Ali Soleimani, Shamsad Parvin:
Dynamic Strategy Optimizer (DSO): Application In Enhancing New User Engagement in Hybrid Recommender System. 750-756 - Tarun Reddi, Charvi Kusuma, Shamsad Parvin:
Mapping Crime Dynamics: Integrating Textual, Spatial, and Temporal Perspectives. 757-763 - Lizeth Carrillo-Mancilla, Luis Rizo Domínguez:
Maximum likelihood estimator for Zipf distribution: a new approach. 764-770 - Sagar Pathak, Dipankar Dasgupta:
Federated Learning with Authenticated Clients. 771-780 - Peizhi Yan, Tala Talaei Khoei, Reena Sajad Hyder, Reemaa Sajad Hyder:
A Dual-Stage Ensemble Approach to Detect and Classify Ransomware Attacks. 781-786 - Eric Zabala, Husnu S. Narman:
Development and Evaluation of an AI-Enhanced Python Programming Education System. 787-792 - Ocheme Anthony Ekle, Denis A. Ulybyshev:
Enhanced Categorization of Cybersecurity Vulnerabilities. 800-806
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.