| 8 |
Design and Implementation of an Agentic AI Security Framework |
Niharika Jain,
|
Niharika Jain |
 |
 |
 |
 |
| 9 |
Intelligent Agents for Autonomous Task Execution_ A Survey on AI-Powered Program Automation |
Arash Kermani Kolankeh,
|
Arash Kermani Kolankeh |
 |
 |
 |
 |
| 13 |
AI for Advanced Financial Fraud Detection and Prevention |
Sai Nerella,
|
Sai Nerella |
 |
 |
 |
 |
| 14 |
Integrative Multimodal Emotion Detection: Leveraging Text, Voice, and Facial Analysis |
ADABALA HEMA SRINIVAS,
|
|
 |
 |
 |
 |
| 15 |
AI-Powered Marketing Strategies: Unlocking Economic Potential and Consumer Engagement in Qatar - A systemic literature review |
Nasim Shah Shirazi,
Muhammad Zain Malik,
Warda Saman,
Farhan Malik,
Allah Wasaya,
|
Muhammad Zain Malik |
 |
 |
 |
 |
| 18 |
Vulnerable Data Analysis on the Dark Web using Large Language Models(LLMS) |
Joshua Henry,
|
|
 |
 |
 |
 |
| 22 |
CodeSync: Multi-Agent System for Programming Assistance and Deterministic Thinking |
Bala Guhanesh,
Maheswari S,
Sasikumar P,
Arunkumar Sivaraman,
|
Maheswari S |
 |
 |
 |
 |
| 24 |
Leveraging Blockchain for Secure and Transparent Patient Case Data Management: Insights from System Implementation and Use Cases |
Varun Dev Sahu,
Pritish Dipak Divate,
Yash Rajesh Akolu,
Maheswari S,
Sumaiya Thaseen,
|
Sumaiya Thaseen |
 |
 |
 |
 |
| 26 |
CPFE-Focus: Contextual Prior and Facial Stream-Assisted Focus enhancer and 3D Gaussian transition |
Aman Kumar,
Chirag Bhatia,
|
Aman Kumar |
 |
 |
 |
 |
| 27 |
Transforming Pharmaceutical Care: A Digital Approach to Enhancing Patient Engagement |
Kishore Arul,
|
Kishore Arul |
 |
 |
 |
 |
| 28 |
Low-Cost EEG System for Decoding Imagined Phoneme Speech |
Kishore Arul,
|
Kishore Arul |
 |
 |
 |
 |
| 30 |
Multi-Agent Deep Reinforcement Learning Allies for Adaptive Algorithms of Trading Systems |
Arpit Garg,
Teja Sai Sharma Ramadugu,
|
Arpit Garg |
 |
 |
 |
 |
| 31 |
Sybil Attack Detection in Urban VANET Using Exponentially Spider-Tailed Viper Optimization Based Shuffle Attention Network |
Nitha Velayudhan,
|
Nitha Velayudhan |
 |
 |
 |
 |
| 32 |
AI-powered Climate Change Analytics Approach |
Asem Omari,
Azmi Alazzam,
Said Badreddine,
Omaia Al-Omari,
|
Asem Omari |
 |
 |
 |
 |
| 33 |
SmartInject: Automated SQL Injection Testing using Deep Q-Learning and LSTM-Based Payload Generation |
Mohammad ALhussin,
Arash Kermani,
Gandeva Satrya,
|
Mohammad ALhussin |
 |
 |
 |
 |
| 34 |
Reimagining E-Governance Document Security with Blockchain and Dynamic Consensus |
Priyanka Mishra,
Ganesan R,
|
Ganesan R |
 |
 |
 |
 |
| 35 |
Simplex Covert Communication Channel Via Google DNS TCP Keep-Alive Packets |
Rashed Alnuman,
Huda Saadeh,
|
Rashed Alnuman |
 |
 |
 |
 |
| 38 |
Green/Energy-Efficient AI: Strategies for Reducing Power Usage in Large-Scale Model Training |
Arpit Garg,
Anuraj Bhosale,
|
|
 |
 |
 |
 |
| 39 |
Attention-Enhanced ResNet for Accurate Alzheimer’s Disease Classification |
Santo Paul M,
Anita X,
Martin Leo Manickam J,
Benson Edwin Raj,
|
Anita X |
 |
 |
 |
 |
| 40 |
Blockchain-Enabled and Paperless Identity Systems for Environmental Sustainability |
Tunga Sayıcı,
Deniz Salucu,
|
Tunga Sayıcı |
 |
 |
 |
 |
| 41 |
Enabling Metaverse with an AI Companion |
Kuntal Gaur,
Gautam Samblani,
Gatim Saini,
|
Kuntal Gaur |
 |
 |
 |
 |
| 43 |
Digital Forensics in Social Media Investigations |
Manal Waqas,
|
Manal Waqas |
 |
 |
 |
 |
| 44 |
Application Of Transfer Learning in Autism Spectrum Disorder Detection Using Brain Imaging |
Sasikumar Periyasamy,
Maheswari Subburaj,
|
Sasikumar Periyasamy |
 |
 |
 |
 |
| 47 |
Security Risks and Privacy Challenges of Large Language Models in Enterprise Environments |
Soliana Hailemichael,
Maria Chano,
Eman El-Sheikh,
Thaier Hayajneh,
|
Thaier Hayajneh |
 |
 |
 |
 |
| 48 |
Innovative Surveillance strategy Advanced Surveillance Systems for Adaptive Security |
Nischith T N,
Surya Sathyanandam,
Prince Depani,
Rathan H V,
Shaman B H,
|
Nischith T N |
 |
 |
 |
 |
| 49 |
IMPACT OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ON CUSTOMER EXPERIENCE AS A CATALYST TO NEW MARKETING STRATEGY1 |
Adelina Emini,
|
Adelina Emini |
 |
 |
 |
 |
| 50 |
Deep Learning-Based Gesture Recognition for Myoelectric Prosthetic Control Using sEMG |
Shanmukha Rapeti,
Adithya Nandakumar,
|
Shanmukha Rapeti |
 |
 |
 |
 |
| 52 |
Reverse Silhouette Cherry Segmentation Using EfficientNetB7-U-Net with Morphological Post-Processing |
Hariharan Hariharan,
Kaushik S,
Abilesh S D,
Jani Anbarasi L,
Modigari Narendra,
Benson Edwin Raj,
|
Benson Edwin Raj |
 |
 |
 |
 |
| 53 |
Green AI and Sustainable Technology |
Zainab Al-zanbouri,
|
Zainab Al-zanbouri |
 |
 |
 |
 |
| 55 |
Enhancing Remote Healthcare Through Contactless Interaction |
Martin Žagar,
Ivica Klapan,
Alan Mutka,
Zlatko Majhen,
|
Martin Žagar |
 |
 |
 |
 |
| 57 |
Enhancing Third-Party Risk Management in Aviation: A Comprehensive Framework for Modern Challenges |
Khalil Al Hussaeni,
Shamma Bin Hammad,
|
Khalil Al Hussaeni |
 |
 |
 |
 |
| 61 |
Revolutionizing Emotion Detection: An Advanced Text Emotion Recognition System (ATERS) for Non-Binary Sentiment Analysis based on Fine-tuned DistilBERT |
Hamza Alabdallah,
Suleiman Yerima,
|
Hamza Alabdallah |
 |
 |
 |
 |
| 62 |
Real-Time Image Arabic Captioning (RIAC): A Comprehensive Hybrid Framework for Accurate Arabic Captions Generation |
Hamza Alabdallah,
Suleiman Yerima,
|
Hamza Alabdallah |
 |
 |
 |
 |
| 63 |
A Blockchain-based Storage System Using The Cow Protocol |
Utkarsh Pandey,
|
Utkarsh Pandey |
 |
 |
 |
 |
| 64 |
Malware Detection and Analysis Using Large Language Models: A Systematic Review |
Peter Chang,
Mashel Albalooshi,
Hamda AlFalasi,
Thekra AlTamimi,
Abdulrahman Almarzooqi,
Suleiman Yerima,
|
Suleiman Yerima |
 |
 |
 |
 |
| 67 |
Improved Drone Detection Approach: Using RF-based Techniques and Deep Learning |
Mariam Alaboudi,
Qassim Nasir,
Manar Abu Talib,
|
Manar Abu Talib |
 |
 |
 |
 |
| 68 |
Inside the Machine: How ChatGPT Thinks, and Why It Is Reshaping Human Imagination |
Constantine Andoniou,
|
Constantine Andoniou |
 |
 |
 |
 |
| 70 |
Visual Provenance: Adaptive Networks for Synthetic Content Detection |
Ashutosh Agarwal,
|
Ashutosh Agarwal |
 |
 |
 |
 |
| 71 |
Phishing URL detection with calibrated probabilities and policy-aligned thresholds |
Eiman Tamah Al-Shammari,
|
Eiman Tamah Al-Shammari |
 |
 |
 |
 |
| 72 |
Reinforcement Learning Approach for Intrusion Detection |
Kusuma Kakarla,
Meghana Arepalli,
Praveen Kumar Kollu,
|
Kusuma Kakarla |
 |
 |
 |
 |
| 73 |
Proactive Approach to Identify and Mitigate Cybersecurity Threats in Smart Building using AI |
Shayma Abdulla,
Shayma Alhayyas,
|
Shayma Abdulla |
 |
 |
 |
 |
| 74 |
The Application of Artificial Neural Network for Optimal Real-time Control of Microgrids |
Luka Zoroje,
Goran Dobrić,
Mileta Žarković,
Miodrag Forcan,
Jovana Forcan,
Manuel Barragán-Villarejo,
Francisco de Paula García-López,
Marene Larruskain,
Oihane Abarrategi,
|
Luka Zoroje |
 |
 |
 |
 |
| 75 |
SymptoBuddy: A Progressive Web-Based AI Symptom Checker to Enhance Preliminary Health Assessment |
Asma'a Ishowo,
Joseph Awotunde,
Nor Hitam,
Fatimah Ishowo-Oloko,
|
Fatimah Ishowo-Oloko |
 |
 |
 |
 |
| 76 |
Evolution of YOLO models and a Comparative Evaluation for Pedestrian Detection |
Ma Althea Retig,
Fakeha Ansari,
Maitha Almarri,
Suleiman Yerima,
|
Ma Althea Retig |
 |
 |
 |
 |
| 77 |
Simulating a Ransomware Attack for Security Evaluation |
Othman Othman,
Yazan Al Balawi,
|
Yazan Al Balawi |
 |
 |
 |
 |
| 78 |
Eye Gesture-Based Robotic Arm Control Using EOG and Machine Learning |
Mohammed Alshehhi,
Abhilasha Singh,
Jinane Mounsef,
|
Jinane Mounsef |
 |
 |
 |
 |
| 79 |
Feature Fusion of Deep and Spatio-temporal Features for Dynamic Scene Understanding |
Areej Ahmed,
Ishana Jabbar,
Shehryar Naeem,
Md Azher Uddin,
|
Md Azher Uddin |
 |
 |
 |
 |
| 81 |
Game Theory–Driven AI for Zero Trust Security |
Al Amin Hossain,
Darryl Ahner,
Michael Larkin,
|
Al Amin Hossain |
 |
 |
 |
 |
| 82 |
The Distribution of CVE-Based Vulnerabilities on CMS Platforms |
Saadet Elif Tokuoglu,
Deniz Balta,
Musa Balta,
|
Musa Balta |
 |
 |
 |
 |
| 83 |
SwarmForm: A Survey of Shape Formation in Modular and Decentralized Robot Systems |
Arash Kermani Kolankeh,
|
Arash Kermani Kolankeh |
 |
 |
 |
 |
| 87 |
Self-Contained Phishing Website Detection Using Machine Learning with Rendered URL and HTML Features |
Yusuf Ozaslan,
M. Fatih Adak,
|
Yusuf Ozaslan |
 |
 |
 |
 |
| 88 |
AI and ML Bases Traffic Prediction System to Improve City Commutes |
Majid Alkharusi,
Santhosh John,
|
Santhosh John |
 |
 |
 |
 |
| 89 |
Variability Management of Contextual Feature Model in Multi-Software Product Line |
Asad Abbas,
Muhammad Fezan Afzal,
|
Asad Abbas |
 |
 |
 |
 |
| 90 |
Behavioural Biometrics: A Gait Recognition Approach |
Pradeep Kumar,
Kuntal Gaur,
Shivansh Tripathi,
Khushi Sharma,
Aryan Tyagi,
|
Pradeep Kumar |
 |
 |
 |
 |
| 91 |
Orchestrating Intelligence: Towards A Framework for AI-Augmented Software Engineering Education |
Usman Durrani,
Asif Malik,
Mustafa Akpinar,
|
Usman Durrani |
 |
 |
 |
 |
| 92 |
Conceptual Foundations of Home Digital Twins for the Metaverse: History, Definitions, and Frameworks |
Usman Durrani,
Asif Malik,
Mohammed Hassouna,
|
Mohammed Hassouna |
 |
 |
 |
 |
| 93 |
Applications of Home Digital Twins in the Metaverse: Energy, Safety, Healthcare, and Personalized Living |
Asif Malik,
Muhammad Adnan,
Mustafa Akpinar,
|
Asif Malik |
 |
 |
 |
 |
| 94 |
Weighted Ensemble Approach To Create Vulnerable Smart Contract Datasets |
Rashed Alnuman,
Qusai Hasan,
Tayyab Sajid,
Wesam Almobaideen,
|
Rashed Alnuman |
 |
 |
 |
 |
| 96 |
A Comparative Study on IoT Attack Detection |
Kevser Ovaz Akpinar,
Saleem Abdo,
Jarryd Brits,
|
Kevser Ovaz Akpinar |
 |
 |
 |
 |