Search Results - "2024 International Conference on Computer, Information and Telecommunication Systems (CITS)"
-
1
Buildings, Approximate True Orthophoto Construction From Satellite Imagery Using Semantic Segmentation and the ICP Algorithm
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…Orthorectification corrects geometric distortions in satellite imagery, ensuring each point on the orthophoto represents true coordinates on Earth accurately,…”
Get full text
Conference Proceeding -
2
An Effective Learning Management System for Revealing Student Performance Attributes
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…A learning management system (LMS) streamlines the teaching process in a centralized place, recording, tracking, and reporting the delivery of educational…”
Get full text
Conference Proceeding -
3
Cloud-Based Perspective for Intelligent Transportation and Crime Prevention: A Web Deployment Solution
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…In the cutting edge domain that is the ever so expanding smart city, the need for development tools that can keep up with such an urban environment is ever so…”
Get full text
Conference Proceeding -
4
Next-Generation Orchestration: Quantum Computing for Network Services
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…As the demand for high-performance and dynam-ically adaptable network services continues to grow, the convergence of quantum computing and network…”
Get full text
Conference Proceeding -
5
Artificial Intelligence for Real-Time Disaster Management: A New Platform for Efficient Recovery and Volunteer Training
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…Natural disasters can be unexpected. They are a part of life, and there is no guarantee of when they will happen, how severe they will be, and how many lives…”
Get full text
Conference Proceeding -
6
Allocation and Scheduling of Linear Workflows Incorporating Security Constraints Across Fog and Cloud Infrastructures
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…The escalating volume of data produced by IoT devices places heavy pressure on the resources of conventional cloud data centers. This impedes their ability to…”
Get full text
Conference Proceeding -
7
EL-FAM: Power System Intrusion Detection with Ensemble Learning for False Alarm Mitigation
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…Power systems must be secured against malicious activity and unauthorized access with the help of intrusion detection systems (IDS). Unfortunately, it is often…”
Get full text
Conference Proceeding -
8
Sequence-Aware Service Recommendation Based on Graph Convolutional Networks
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…With the increasing number of Web services, how to quickly and efficiently recommend services that meet user needs has become a major research hotspot in the…”
Get full text
Conference Proceeding -
9
A Study on "Blockchain-Enabled Digital Twins: The Next Wave of Industrial Transformation with Future Research Challenges"
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…A new era of creativity, efficiency, and optimisation has emerged across a number of industrial sectors with the introduction of digital twin technologies. To…”
Get full text
Conference Proceeding -
10
Enhancing Autopsy with G-Code File Recovery: Ingest Module Development
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…This study studies the effectiveness of file-level and data source-level ingest modules in recovering g-code files in digital forensic investigations. Four…”
Get full text
Conference Proceeding -
11
Multidimensional Euclidean Distance Calculation using In-Memory Computing
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…Euclidean distance (ED) calculation is essential in wireless communication systems and signal processing applications. This paper presents a low-complexity,…”
Get full text
Conference Proceeding -
12
Advancements of Machine Learning in Malware and Intrusion Detections
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…Machine learning techniques have become essential tools in the ongoing battle against cyber threats, with a particular focus on malware and intrusion…”
Get full text
Conference Proceeding -
13
Densifying NextG Cells with Wireless Backhaul
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…Deploying small cells with wireless backhaul promises to improve aggregate NextG cel-lular system capacity and coverage, and reduce the need for disruptive and…”
Get full text
Conference Proceeding -
14
Serious Games, Serious Impact: Enhancing Ethical Education Through Interactive Learning
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…Recognizing the crucial role of active engagement in ethical matters-essential not only for combating corruption but also for cultivating a positive ethical…”
Get full text
Conference Proceeding -
15
Bi-GRU Based Botnet Attack Detection: Performance Comparison Between Centralized and Federated Learning
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…The number of connected IoT devices is increasing every year. This leads to concerns due to their potential exploitation in Botnet attacks. Botnet attack…”
Get full text
Conference Proceeding -
16
TGAT: Temporal Graph Attention Network for Blockchain Phishing Scams Detection
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…In recent years, blockchain has emerged as a promising technology with extensive applications in various fields. One of its most notable applications is…”
Get full text
Conference Proceeding -
17
Evaluating Machine Learning Models for Wheat Yield Prediction in Amritsar District
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…Agriculture is pivotal for global food security and economic stability, yet optimizing yields remains a formidable challenge amidst variable climatic…”
Get full text
Conference Proceeding -
18
Mobile Devices' Low Charge, High CPU Load, Number of Sensors, and OS Features Delay Sensor Data Readings
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…Sensor data reliability plays a critical role in applications that collect and use this data. The types of effects that can invalidate the data could be…”
Get full text
Conference Proceeding -
19
A Robust Subtree-Based Authentication Scheme for TMIS Using Chaotic Hash Function
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…The widespread availability of broadband telecommunication and the relatively affordable cost of vital signs monitoring devices have enabled telemedicine to…”
Get full text
Conference Proceeding -
20
Effects of Cropping vs Resizing on the Performance of Brain Tumor Segmentation Models
Published in 2024 International Conference on Computer, Information and Telecommunication Systems (CITS) (17-07-2024)“…This study investigated the effects of image resizing vs cropping on the performance of state-of-the-art models for the brain tumor segmentation task. This is…”
Get full text
Conference Proceeding