Search Results - "2024 International Conference on Computer, Information and Telecommunication Systems (CITS)"

Refine Results
  1. 1

    Buildings, Approximate True Orthophoto Construction From Satellite Imagery Using Semantic Segmentation and the ICP Algorithm by Kavran, Domen, Mongus, Domen, Lukac, Niko

    “…Orthorectification corrects geometric distortions in satellite imagery, ensuring each point on the orthophoto represents true coordinates on Earth accurately,…”
    Get full text
    Conference Proceeding
  2. 2

    An Effective Learning Management System for Revealing Student Performance Attributes by Zhang, Xinyu, Obaidat, Mohammad S., Lee, Vincent CS, Xu, Duo, Chen, Jun

    “…A learning management system (LMS) streamlines the teaching process in a centralized place, recording, tracking, and reporting the delivery of educational…”
    Get full text
    Conference Proceeding
  3. 3

    Cloud-Based Perspective for Intelligent Transportation and Crime Prevention: A Web Deployment Solution by Nedeljkovic, Denis, Jammal, Manar

    “…In the cutting edge domain that is the ever so expanding smart city, the need for development tools that can keep up with such an urban environment is ever so…”
    Get full text
    Conference Proceeding
  4. 4

    Next-Generation Orchestration: Quantum Computing for Network Services by Zeydan, Engin, Blanco, Luis, Mangues-Befalluy, Josep, Arslan, Suayb S., Turk, Yekta

    “…As the demand for high-performance and dynam-ically adaptable network services continues to grow, the convergence of quantum computing and network…”
    Get full text
    Conference Proceeding
  5. 5

    Artificial Intelligence for Real-Time Disaster Management: A New Platform for Efficient Recovery and Volunteer Training by Al-Rajab, Murad, Soliman, Mahmoud Ahmed, Alasad, Mohammed Nezam, Jamil, Yaqoob Arshad, Loucif, Samia, Qatawneh, Ibrahim Al

    “…Natural disasters can be unexpected. They are a part of life, and there is no guarantee of when they will happen, how severe they will be, and how many lives…”
    Get full text
    Conference Proceeding
  6. 6

    Allocation and Scheduling of Linear Workflows Incorporating Security Constraints Across Fog and Cloud Infrastructures by Karatza, Helen D.

    “…The escalating volume of data produced by IoT devices places heavy pressure on the resources of conventional cloud data centers. This impedes their ability to…”
    Get full text
    Conference Proceeding
  7. 7

    EL-FAM: Power System Intrusion Detection with Ensemble Learning for False Alarm Mitigation by Bhavsar, Ansh, Agvan, Sezan, Ramoliya, Fenil, Obaidiat, Mohammad S., Gupta, Rajesh, Tanwar, Sudeep, Hsiao, Kuei-Fang

    “…Power systems must be secured against malicious activity and unauthorized access with the help of intrusion detection systems (IDS). Unfortunately, it is often…”
    Get full text
    Conference Proceeding
  8. 8

    Sequence-Aware Service Recommendation Based on Graph Convolutional Networks by Xiao, Gang, Wang, Cece, Wang, Qibing, Song, Junfeng, Lu, Jiawei

    “…With the increasing number of Web services, how to quickly and efficiently recommend services that meet user needs has become a major research hotspot in the…”
    Get full text
    Conference Proceeding
  9. 9

    A Study on "Blockchain-Enabled Digital Twins: The Next Wave of Industrial Transformation with Future Research Challenges" by Dwivedi, Sanjeev Kumar, Obaidat, Mohammad S., Mittal, Mansi, Ranjan, Nilesh, Tyagi, Honey, Amin, Ruhul, Hsiao, Kuei-Fang

    “…A new era of creativity, efficiency, and optimisation has emerged across a number of industrial sectors with the introduction of digital twin technologies. To…”
    Get full text
    Conference Proceeding
  10. 10

    Enhancing Autopsy with G-Code File Recovery: Ingest Module Development by Garland, Laura, Kirui, Pamela, An, Min Kyung

    “…This study studies the effectiveness of file-level and data source-level ingest modules in recovering g-code files in digital forensic investigations. Four…”
    Get full text
    Conference Proceeding
  11. 11

    Multidimensional Euclidean Distance Calculation using In-Memory Computing by Mahdavi, Mojtaba

    “…Euclidean distance (ED) calculation is essential in wireless communication systems and signal processing applications. This paper presents a low-complexity,…”
    Get full text
    Conference Proceeding
  12. 12

    Advancements of Machine Learning in Malware and Intrusion Detections by Gazeau, Valentin, Gupta, Khushi, An, Min Kyung

    “…Machine learning techniques have become essential tools in the ongoing battle against cyber threats, with a particular focus on malware and intrusion…”
    Get full text
    Conference Proceeding
  13. 13

    Densifying NextG Cells with Wireless Backhaul by Brassil, Jack

    “…Deploying small cells with wireless backhaul promises to improve aggregate NextG cel-lular system capacity and coverage, and reduce the need for disruptive and…”
    Get full text
    Conference Proceeding
  14. 14

    Serious Games, Serious Impact: Enhancing Ethical Education Through Interactive Learning by Santorum, Marco, Morales-Martinez, David, Caiza, Jonathan, Carrion-Toro, Mayra, Galindo, Julian, Acosta-Vargas, Patricia

    “…Recognizing the crucial role of active engagement in ethical matters-essential not only for combating corruption but also for cultivating a positive ethical…”
    Get full text
    Conference Proceeding
  15. 15

    Bi-GRU Based Botnet Attack Detection: Performance Comparison Between Centralized and Federated Learning by Maharddhika, I. Nyoman Putra, Chen, Jiann-Liang

    “…The number of connected IoT devices is increasing every year. This leads to concerns due to their potential exploitation in Botnet attacks. Botnet attack…”
    Get full text
    Conference Proceeding
  16. 16

    TGAT: Temporal Graph Attention Network for Blockchain Phishing Scams Detection by Dai, Chaofan, Tang, Qideng, Ding, Huahua

    “…In recent years, blockchain has emerged as a promising technology with extensive applications in various fields. One of its most notable applications is…”
    Get full text
    Conference Proceeding
  17. 17

    Evaluating Machine Learning Models for Wheat Yield Prediction in Amritsar District by Rana, Aryan, Dhiman, Anurag, Obaidat, Mohammad S., Kumar, Pankaj, Kumar, Kranti

    “…Agriculture is pivotal for global food security and economic stability, yet optimizing yields remains a formidable challenge amidst variable climatic…”
    Get full text
    Conference Proceeding
  18. 18

    Mobile Devices' Low Charge, High CPU Load, Number of Sensors, and OS Features Delay Sensor Data Readings by Gafurov, Boris, Stavrou, Angelos

    “…Sensor data reliability plays a critical role in applications that collect and use this data. The types of effects that can invalidate the data could be…”
    Get full text
    Conference Proceeding
  19. 19

    A Robust Subtree-Based Authentication Scheme for TMIS Using Chaotic Hash Function by Meshram, Chandrashekhar, Obaidat, Mohammad S., Sadoun, Balqies, Imoize, Agbotiname Lucky, Gaikwad, Vishesh P.

    “…The widespread availability of broadband telecommunication and the relatively affordable cost of vital signs monitoring devices have enabled telemedicine to…”
    Get full text
    Conference Proceeding
  20. 20

    Effects of Cropping vs Resizing on the Performance of Brain Tumor Segmentation Models by Magboo, Ma. Sheila A., Coronel, Andrei D.

    “…This study investigated the effects of image resizing vs cropping on the performance of state-of-the-art models for the brain tumor segmentation task. This is…”
    Get full text
    Conference Proceeding