Paper ID | Title | Authors | Speaker | Paper Format | Page Extension | Is Paid | Camera Ready |
---|---|---|---|---|---|---|---|
29 | A Classification Tool for Indoor Air Quality Management with Explainability | Evangelos Spyrou, Vassilios Kappatos, | Evangelos Spyrou | ![]() |
![]() |
![]() |
![]() |
30 | Tracking without a Tracker. A Computer Vision Algorithm for Person Counting | Evangelos Spyrou, Vassilios Kappatos, | Evangelos Spyrou | ![]() |
![]() |
![]() |
![]() |
32 | Success Factors of Enterprise Resource Planning: A State-of-the Art Mini Review | Ahmed BaniMustafa, Olla Baulkrock, | Ahmed BaniMustafa | ![]() |
![]() |
![]() |
![]() |
51 | An Automated System for Food Monitoring Using Internet of Things | Mangala Shetty, Kripa B Acharya, Spoorthi B Shetty, | Mangala Shetty | ![]() |
![]() |
![]() |
![]() |
54 | Integrating Tradition And Technology : A survey of AI applications in the design of temple architecture | Diya P, Meghana J, Harshavardhana R Bellad, Ishwari Magdum, Srinivas K S, | Diya P | ![]() |
![]() |
![]() |
![]() |
57 | Optimizing Email Spam Detection in Academic Environments: A Machine Learning Approach | Ja'far Alqatawna, Ghazala Bilquise, Ala' M. Al-Zoubi, | Ghazala Bilquise | ![]() |
![]() |
![]() |
![]() |
60 | Project Management in Software Development – The UAE Example | Khuloud Alzarooni, Turki Al Ali, | Khuloud Alzarooni | ![]() |
![]() |
![]() |
![]() |
68 | Risk Identification and Relapse Prediction in Lung Adenocarcinoma (LUAD) | Radhika Khatri, Faryal Khan, | Radhika Khatri | ![]() |
![]() |
![]() |
![]() |
78 | Drones And Surveillance: Challenges & Legal Regulation Against Drone Crimes In India | Bharanitharan K, Gagandeep Kaur, Vinod Shukla, | Vinod Shukla | ![]() |
![]() |
![]() |
![]() |
84 | Evaluating Source Code Comment Quality: The Need for Comprehensive Indexes in Software Development | Mustafa A.E. Kılıç, M. Fatih Adak, | Mustafa A.E. Kılıç | ![]() |
![]() |
![]() |
![]() |
85 | VulnerAI: GPT Based Web Application Vulnerability Detection | Kevser Ovaz Akpinar, Sohan Singh Saimbhi, | Kevser Ovaz Akpinar | ![]() |
![]() |
![]() |
![]() |
86 | Automated Identification of Epileptic Seizures from Electroencephalography Data using Deep Features and Metaheuristic-Driven Model | Taranjit Kaur, Tapan Gandhi, | Taranjit Kaur | ![]() |
![]() |
![]() |
![]() |
92 | SCOUT: Surveillance and Cyber harassment Observation of Unseen Threats | Sumitra Biswal, | Sumitra Biswal | ![]() |
![]() |
![]() |
![]() |
93 | Explainable AI for Real-Time Object Detection in Autonomous Driving | Tayyab Sajid, Omar Abdul Latif, | Omar Abdul Latif | ![]() |
![]() |
![]() |
![]() |
94 | Prolong the Lifetime of Wireless Sensor Network | Aws Yonis, Shireen Ghanim, | Aws Yonis | ![]() |
![]() |
![]() |
![]() |
95 | Educational innovations supported by AI, VR, AR and metaverse technologies | Alejandro Acuña, | Alejandro Acuña | ![]() |
![]() |
![]() |
![]() |
97 | Secure Design and Implementation of OPC Standards Based Log/Process Gathering Framework for Water Management Systems | Deniz Balta, Musa Balta, Hakan Kırık, Yasin Esen, | Musa Balta | ![]() |
![]() |
![]() |
![]() |
98 | A Proposal of NFA Model for Anomaly Detection of Potable Water Management Process | Deniz Balta, Musa Balta, Deniz Berfin Taştan, Murat İskefiyeli, | Deniz Balta | ![]() |
![]() |
![]() |
![]() |
104 | Assessing the Effectiveness of Large Language Models in Student Major Recommendation | Usman Durrani, Asif Malik, Milan Dordevic, Mustafa Akpinar, Madeline Togher, Samer Aoudi, | Usman Durrani | ![]() |
![]() |
![]() |
![]() |
105 | Assessing the Effectiveness of Large Language Models in Predicting Student Dropout Rates | Usman Durrani, Mustafa Akpinar, Madeleine Toghr, Asif Malik, Milan Dordevic, Samer Aoudi, | Usman Durrani | ![]() |
![]() |
![]() |
![]() |
107 | Attention to Patterns is all you need for Insider threat detection | Priya Tiwary, Akshayraj Madhubalan, Amit Gautam, Raj Darji, | Akshayraj Madhubalan | ![]() |
![]() |
![]() |
![]() |
108 | Fusion of Deep Learned and Handcrafted Features for Paddy Disease Recognition | Md Azher Uddin, Joolekha Bibi Joolee, | Md Azher Uddin | ![]() |
![]() |
![]() |
![]() |
121 | Pattern-based Development For Event-B Models | Elie Fares, Jean-Paul Bodeveix, Mamoun Filali, Asem Kasem, | Elie Fares | ![]() |
![]() |
![]() |
![]() |
122 | Predicting Energy Demand with Interpretable Machine Learning Models | Yashwanth Karuparthi, Syed Shoaib, Harshadeep Kommareddi, Angel Arul Jothi J, | Yashwanth Karuparthi | ![]() |
![]() |
![]() |
![]() |
124 | Smart Management of Product Status and Exclusive Secured Information Using Augmented Reality | Ankita Dixit, Ilisha Walia, | Ankita Dixit | ![]() |
![]() |
![]() |
![]() |
125 | Leveraging Semantic Coupling Through Class Name Embeddings for Software Change Prediction | Nur Banu Ogur, Beyza Eken, | Nur Banu Ogur | ![]() |
![]() |
![]() |
![]() |
126 | A Metaverse platform for medical students training and assessment on human anatomy | Sana Ben Hammouda, Maher Maoua, Majed Bouchahma, | Sana Ben Hammouda | ![]() |
![]() |
![]() |
![]() |
127 | Deep Learning Method for Under-Canopy Tree Detection and Mapping using 2D LiDAR | Chia Chie Lee, | Chia Chie Lee | ![]() |
![]() |
![]() |
![]() |
128 | Blockchain Revolution in the Metaverse: Challenges, Applications and Future Directions | Vangelis Malamas, Thomas Dasaklis, Panayiotis Kotzanikolaou, Dimitris Koutras, Vassilis Vasilakopoulos, | Vangelis Malamas | ![]() |
![]() |
![]() |
![]() |
130 | Fast Licence Plate Recognition of Moving Vehicles Using Deep Learning Techniques | Abhilasha Singh, Afnan Ahmed Adil, Houssein Kanso, Jinane Mounsef, Muhieddin Amer, | Abhilasha Singh | ![]() |
![]() |
![]() |
![]() |
131 | A Comprehensive Analysis of Modern Generative Models for Echocardiography Image Synthesis | Aigerim Bolshibayeva, Sabina Rakhmetulayeva, | Sabina Rakhmetulayeva | ![]() |
![]() |
![]() |
![]() |
133 | SHADOW: A framework for Systematic Heuristic Analysis and Detection of Observations on the Web | Aaditya Rengarajan, Lohith Senthilkumar, Neelesh Padmanabh, Akhil Ramalingam, | Aaditya Rengarajan | ![]() |
![]() |
![]() |
![]() |
134 | Survey on Network-based Covert Communication Techniques | Rashed Alnuman, Qusai Hasan, Huda Saadeh, | Rashed Alnuman | ![]() |
![]() |
![]() |
![]() |
135 | A Real-Time Carboy Tracking and Counting System Based on YOLOv8 and ByteTrack | Ferhat Akar, Sezer Berber, Oğuzhan Koca, Cüneyt Bayılmış, | Ferhat Akar | ![]() |
![]() |
![]() |
![]() |
136 | AudioMorse: A Morse-based Covert Channel That Leverages Audio Streaming Platforms | Jarryd Brits, Saleem Abdo, Osama Masoud, Rashed Al Shamali, Ahmad Al Shehhi, Saeed Albanna, Huda Saadeh, | Huda Saadeh | ![]() |
![]() |
![]() |
![]() |