Baoulé Related Parallel Corpora for Machine Translation Tasks: Mtbci-1.0 Kouassi Konan Jean-Claude, Bircham International University, Spain |
A Neural Network Approach to Understanding Employee Retention Dynamics: Insights from Feature Importance Analysis Han-Chen Huang, Chung Hua University, Taiwan |
Enhancing Organizational Efficiency of the Lantern Festival in Penghu, Taiwan Through Information Technology: Key Factors Analysis Shih-Ping Chang and Han-Chen Huang, Chung Hua University, Taiwan |
Evaluating the Effect of Human Activity on Air Quality using Bayesian Networks and IDW Interpolation Hema Durairaj1 and L Priya Dharshini2, 1Publicis Sapient Pvt. Ltd., India, 2Lady Doak College, India |
Resources Price Adjustment in Cloud Computing for Load Balancing and Fairness Between Users and Suppliers Lilia Chourou Gherir1, Ahmed Elleuch2 and Mohamed Jemni1, 1University of Tunis, Tunisia, 2University of Manouba, Tunisia |
Exploring the Selection and Training of Tour Leaders: An Evaluation Model Based on the Analytic Hierarchy Process Yuang-Liang Sun and Han-Chen Huang, Chung Hua University, Taiwan |
Analysis of Key Factors Influencing Penghu Tourism Development using the Delphi Method and AHP Pao-TsaiKuo and Han-Chen Huang, Chung Hua University, Taiwan |
Malware Detection and Classification using Generative Adversarial Network Krishna Kumar, Hardwari Lal Mandoria, Rajeev Singh, Shri Prakash Dwivedi and Paras, G. B. Pant University of Agriculture and Technology, India |
Utilizing Analytic Network Process for Evaluating Event Management Companies: A Case Study in Celebration Activities Han-Chen Huang, Chung Hua University, Taiwan |
AI-Driven Threat Intelligence: Transforming Cybersecurity for Proactive Risk Management in Critical Sectors SA Mohaiminul Islam1, MD Shadikul Bari1, Ankur Sarkar1, A J M Obaidur Rahman Khan2 and Rakesh Paul1, 1Washington University Of Science & Technology (WUST), USA, 2Independent University (WUST), Bangladesh |
Non-Deterministic and Risk Based Security Services
Srinivas Rao Doddi1 and Akshay Krishna Kotamraju2, 1University of Los Angeles, USA, 2Founder Non-profit, USA |
Database Security Compliance with Anti-Money Laundering Status Opeyemi Ayanbanjo, New England College, Boston |
AI Strategy Formulation Across Various Game Genres - A Literature Review Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA |
Application of Artificial Intelligence Technologies in Security of Cyber-Physical Systems Rashid Alakbarov and Mammad Hashimov, Institute of Information Technology, Azerbaijan |
Exploring White Fragility in Large Language Models Janga Bussaja, Independent Researcher, USA |
A Study on Evaluating Criteria for Electric Bicycle Purchase using ISM and ANP Methods Han-Chen Huang, Chung Hua University, Taiwan |
The Role of Cloud Providers in IoT Services Hristina Dimova Popovska, Tome Dimovski and Filip Popovski, University St. Klement of Ohrid, Macedonia |
FIX Protocol: The Backbone of Financial Trading
Swapnil Kognole, UBS, USA |
Shadowed AHP for Multi-Criteria Supplier Selection
Mohamed Abdel Hameed El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt |
Analysis of Tourist Experiences at Dark Tourism Sites in Kinmen: Clustering Analysis of Motivations, Emotional Responses, and Satisfaction Han-Chen Huang, Chung Hua University, Taiwan |
The Impact of Blockchain Technology on the Financial Services Industry Kinil Doshi, Citibank, USA |
Streamlining Compliance and Risk Management with RegTech Solutions Chintamani Bagwe, Citibank, USA |
A Domain-Invariant Transfer Learning by Bert for Cross-Domain Sentiment Analysis Al-Mahmud and Kazutaka Shimada, Kyushu Institute of Technology, Japan |
The Energy Storage Operation Under Stochastic Renewable Generation Tony Tsang and Chung Kwok Leung, Hong Kong College of Technology, Hong Kong |
Psychological and Graphic Aspects of Colors: Influence and Application in Product Design Filip Popovski1, Hristina Dimova Popovska1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1University St. Klement of Ohrid, Macedonia, 2Internacional Slavic University, Macedonia |
Exploring Bayesian Hierarchical Models for Multi-Level Credit Risk Assessment: Detailed Insights Sanjay Moolchandani, Citibank N.A., USA |
Developing a Genetic Algorithm Based Daily Calorie Recommendation System for Humans Rezaul Karim1,2, Md. Badiuzzaman Biplob1 and Mohammad Shamsul Arefin1, 1Chittagong University of Engineering and Technology, Bangladesh, 2University of Chittagong, Bangladesh |
Revolutionizing System Operation and Maintenance in the Automobile Industry Through Machine Learning Applications Priyank Singh, Tanvi Hungund and Shobhit Kukreti, Rochester Institute of Technology, US |
Player Strategy Modeling in Classic Roleplaying Game Battle Environments Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA |
Integration of Decentralized Finance (DeFi) in the U.S. Supply Chain Finance: Opportunities, Challenges, and Future Prospects Omoshola S. Owolabi, Prince C. Uche, Nathaniel T. Adeniken, Emmanuel Hinneha and Samuel Attakorah, Carolina University, USA |
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Networks Saurabh Mishra1, Rakesh Ranjan1, Sonika Singh2 and Gagan Singh2, 1Sushant University, Inida, 2DIT University, India |
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in the United States Omolola F. Hassan1, Oluwadare O. Aderibigbe1, Oghenekome P. Efijemue1 and Tolulope D. Onasanya2, 1Austin Peay State University, USA, 2North Carolina Agricultural and Technical State University, USA |
Big Data and Machine Learning in Defence
Yijie Weng1 and Jianhao Wu2, 1University of Maryland, USA, 2Cornell University, USA |
AI-Based Home Security System
Syeda Lamima Farhat, Likhitha Tubati, Metrine Osiemo and Rushit Dave, Minnesota State University, USA |
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment of its Cloud and Mobile Application Infrastructure Security Pooja Patil1, Sara Acikkol Dogan1, Samir Tout1, and Ranu Parmar2, 1Eastern Michigan University, USA, 2Hitachi Energy, USA |
Image Segmentation and Classification using Neural Network Fatema Tuj Zohra, Rifa Tasfia Ratri, Shaheena Sultana, and Humayara Binte Rashid, Notre Dame University, Bangladesh
|
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics Rushit Dave, Marcho Handoko, Ali Rashid and Cole Schoenbauer, Minnesota State University, USA
|
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3 Christopher Le1 and Tauheed Khan Mohd2, 1Augustana College, USA, 2Eastern Michigan University, USA
|
Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using Machine Learning Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt and Rushit Dave, Minnesota State University, USA |