Author |
Session |
Start page |
Title |
A A B C D E F G H J K L M N O P R S T U V W Y Z |
A, Amsaveni |
S7.4 |
|
Enhanced Fault Detection and Classification of Wind Turbine Blades Using Machine Learning |
Aalmohamed, Hamdah |
S5.4 |
|
Application of Big Data in Cybersecurity |
Abdallah, Saeed |
S5.1 |
|
Enhanced Channel Estimation for Multi-Tag Ambient Backscatter Communication Systems |
S9.1 |
|
Abnormal Driver Behavior Detection Using Deep Learning |
Abdellatif, Youssef |
S6.2 |
|
Automating Cyber Defense: Enhancing Threat Intelligence with AI-Driven Annotation |
Abdulaziz, Nidhal |
S1.3 |
|
BeeBetter: A Multi-Modular Beehive System for Honeybee Health Monitoring and Hazard Detection |
S10.6 |
|
AI-Powered Autonomous Building Cleaning Robots |
S9.2 |
|
Development and Evaluation of Nao Humanoid Robot for Rehabilitation Therapy |
Abul, Osman |
S9.7 |
|
Generalizable Spatiotemporal Deepfake Detection with Late-Fusion |
Acakpovi, Amevi |
S2.6 |
|
Artificial Neural Network-Based IoT Device for Predicting the Electromagnetic Compatibility |
Adamova, Aigul |
S6.6 |
|
Design of Intrusion Detection and Security Enhancements in Military Wireless Sensor Networks |
Ahmad, Ubaid |
S1.6 |
|
Fall Detection Using Wi-Fi Channel State Information |
Ahmed, Abduselam |
S7.3 |
|
Performance Evaluation of Deep Learning Models for Real-Time Trash Classification on Embedded Device |
Ahmed, Motamen |
S3.1 |
|
Sea Water Salinity Estimation over Dubai Using Satellite Imagery & WASI Empirical Model Approach |
Akkal, Maroua |
S5.6 |
|
An Intrusion Detection System for Detecting DDoS Attacks in Blockchain-Enabled IoMT Networks |
Al Ali, Fatma |
S9.1 |
|
Abnormal Driver Behavior Detection Using Deep Learning |
Al Ali, Hannah |
S3.2 |
|
Data-Driven Predictive Analytics for Multi-Flight Departure Interdependencies in UAE Airspace |
Al Hamadi, Hussam |
S4.2 |
|
Optimized Shape Design of a Dual-Band Circular Slot High Gain Array Antenna Using Genetic Algorithm |
Al-Ahmad, Hussain |
S7.2 |
|
Automated Cuneiform Symbol Detection and Translation Using Deep Learning Techniques |
S7.6 |
|
Analysing Osteoporosis Detection: A Comparative Study of CNN and FNN |
Al-Ali, Naema |
S1.2 |
|
Bilingual Speech Recognition on the Edge Using Machine Learning |
Al-Ali, Reem |
S3.1 |
|
Sea Water Salinity Estimation over Dubai Using Satellite Imagery & WASI Empirical Model Approach |
Al-Ali, Salama Al-Ali |
S7.1 |
|
Deep Learning Based UAV Assisted Distributed Platform for Crowd Source Management |
Al-Saad, Mina |
S7.2 |
|
Automated Cuneiform Symbol Detection and Translation Using Deep Learning Techniques |
Alam, Mohammad |
S10.7 |
|
Detecting Brain Cancer Using Explainable AI |
Alawadhi, Reem |
S5.4 |
|
Application of Big Data in Cybersecurity |
Alawadhi, Sara |
S9.1 |
|
Abnormal Driver Behavior Detection Using Deep Learning |
Albreem, Mahmoud |
S5.1 |
|
Enhanced Channel Estimation for Multi-Tag Ambient Backscatter Communication Systems |
Aldhaheri, Lameya |
S2.2 |
|
Localization Performance Analysis in Agriculture 4.0 Utilizing Low Earth Orbit (LEO) Satellites |
S2.1 |
|
Smart Soil Monitoring: Leveraging LoRa-Based IoT for Sustainable Agriculture 4.0 |
Aldhaheri, Meera Saeed Obaid |
S7.1 |
|
Deep Learning Based UAV Assisted Distributed Platform for Crowd Source Management |
Alemadi, Alia |
S3.1 |
|
Sea Water Salinity Estimation over Dubai Using Satellite Imagery & WASI Empirical Model Approach |
Alfalasi, Hamad |
S9.7 |
|
Generalizable Spatiotemporal Deepfake Detection with Late-Fusion |
Alfili, Tareq |
S3.6 |
|
Machine Learning-Driven Fault Detection System for Electrical Networks |
Alhashemi, Sara |
S5.4 |
|
Application of Big Data in Cybersecurity |
Ali, Nazar |
S1.2 |
|
Bilingual Speech Recognition on the Edge Using Machine Learning |
Alkhawaldeh, Mohammed |
S4.6 |
|
Anti-Forensic Challenges in Digital Forensics Investigations: An Overview of Techniques and Tools |
Alkhazaleh, Hamzah |
S5.4 |
|
Application of Big Data in Cybersecurity |
AlmeqbaalI, Mariam Salem Saeed |
S7.1 |
|
Deep Learning Based UAV Assisted Distributed Platform for Crowd Source Management |
Almohammedi, Ali |
S4.1 |
|
Connected Graph Multitask Diffusion LMS via Orthonormal Codes in Ad-Hoc Networks |
Alnuaimi, Mouza |
S9.1 |
|
Abnormal Driver Behavior Detection Using Deep Learning |
Alqattam Alzaabi, Sara |
S1.2 |
|
Bilingual Speech Recognition on the Edge Using Machine Learning |
Alshahrani, Mesfer |
S7.5 |
|
GuardNet: An Ensemble-Based Malware Detection Model Using Machine Learning |
Alshehhi, Noor |
S2.2 |
|
Localization Performance Analysis in Agriculture 4.0 Utilizing Low Earth Orbit (LEO) Satellites |
S2.1 |
|
Smart Soil Monitoring: Leveraging LoRa-Based IoT for Sustainable Agriculture 4.0 |
Alteneiji, Aysha |
S1.2 |
|
Bilingual Speech Recognition on the Edge Using Machine Learning |
S1.6 |
|
Fall Detection Using Wi-Fi Channel State Information |
Alzahmi, Aisha |
S1.2 |
|
Bilingual Speech Recognition on the Edge Using Machine Learning |
Alzarouni, Sarah |
S3.1 |
|
Sea Water Salinity Estimation over Dubai Using Satellite Imagery & WASI Empirical Model Approach |
Amin, Saad |
S8.2 |
|
Performance Evaluation of Image Enhancement Techniques on Transfer Learning for Touchless Fingerprin |
S8.3 |
|
A Driver Rating System Based on Driving Pattern |
Annane, Boubakeur |
S5.6 |
|
An Intrusion Detection System for Detecting DDoS Attacks in Blockchain-Enabled IoMT Networks |
Arul Jothi, Angel |
S5.2 |
|
Predicting Chargeback Fraud Using Data Mining Techniques |
Ashish, Mani |
S1.1 |
|
Towards Quantum-Inspired Evolutionary Algorithms for Denoising PCG Signals |
Atalla, Shadi |
S6.3 |
|
Enhanced Hybrid Deep Learning Approach for Botnet Attacks Detection |
S5.3 |
|
Blockchain-Powered Asset Tokenization Platform |
Atef, Mohamed |
S1.4 |
|
Heart Rate Estimation from Photoplethysmography Signals Using Fast Fourier Transform |
S1.5 |
|
Camera-Based Remote Heart Rate Monitoring Using Photoplethysmography |
Azzouz, Abdelbasset |
S4.2 |
|
Optimized Shape Design of a Dual-Band Circular Slot High Gain Array Antenna Using Genetic Algorithm |
B A B C D E F G H J K L M N O P R S T U V W Y Z |
Banik, Debajyoty |
S2.4 |
|
Time-Decay Attribution Model Using Half-Life in Exponential Decay for E-Commerce Conversion Analysis |
Benachour, Yassine |
S7.3 |
|
Performance Evaluation of Deep Learning Models for Real-Time Trash Classification on Embedded Device |
Benakcha, Iheb |
S9.3 |
|
Neuromuscular Disease Detection from Electromyograms Using Convolutional and Recurrent Neural Nets |
Bhatia, Sajal |
S7.5 |
|
GuardNet: An Ensemble-Based Malware Detection Model Using Machine Learning |
Bin Ozair Almheiri, Maryam |
S1.2 |
|
Bilingual Speech Recognition on the Edge Using Machine Learning |
Biswas, Ritujoy |
S8.1 |
|
Exploiting Combination of Spectral Features in Light Weight Neural Network for ABE on Limited Data |
Bouhmidi, Rachid |
S4.2 |
|
Optimized Shape Design of a Dual-Band Circular Slot High Gain Array Antenna Using Genetic Algorithm |
Boutellaa, Elhocine |
S9.3 |
|
Neuromuscular Disease Detection from Electromyograms Using Convolutional and Recurrent Neural Nets |
C A B C D E F G H J K L M N O P R S T U V W Y Z |
Caviglia, Daniele |
S10.4 |
|
Noncontact Measurement of Sea Wave Dynamics and Velocity Estimation with a Low-Cost FMCW Radar |
Celestin, Twizere |
S2.6 |
|
Artificial Neural Network-Based IoT Device for Predicting the Electromagnetic Compatibility |
Chawraba, Assil |
S10.4 |
|
Noncontact Measurement of Sea Wave Dynamics and Velocity Estimation with a Low-Cost FMCW Radar |
Cherbal, Sarra |
S5.6 |
|
An Intrusion Detection System for Detecting DDoS Attacks in Blockchain-Enabled IoMT Networks |
Copiaco, Abigail |
S3.6 |
|
Machine Learning-Driven Fault Detection System for Electrical Networks |
S10.2 |
|
Machine Learning Analysis of Atmospheric Effects on Electromagnetic Wave Propagation in the UAE |
D A B C D E F G H J K L M N O P R S T U V W Y Z |
Deriche, Mohamed |
S4.1 |
|
Connected Graph Multitask Diffusion LMS via Orthonormal Codes in Ad-Hoc Networks |
Dey, Suman Kr. |
S2.4 |
|
Time-Decay Attribution Model Using Half-Life in Exponential Decay for E-Commerce Conversion Analysis |
Doodipala, Shreya |
S5.2 |
|
Predicting Chargeback Fraud Using Data Mining Techniques |
E A B C D E F G H J K L M N O P R S T U V W Y Z |
Elamassie, Mohammed |
S4.4 |
|
Dual-Channel Visible Light Communication System for Enhanced V2V Video Streaming |
Elmir, Youssef |
S10.3 |
|
Evaluating Outputs Fusion Technique in Multimodal Human Activity Recognition |
Elshehaby, Shahad |
S7.2 |
|
Automated Cuneiform Symbol Detection and Translation Using Deep Learning Techniques |
F A B C D E F G H J K L M N O P R S T U V W Y Z |
Farrag, Mohamed |
S6.1 |
|
Bluffing the Hackers: Automated Decoy Creation and Real-Time Cyber Deception |
Flitti, Farid |
S7.3 |
|
Performance Evaluation of Deep Learning Models for Real-Time Trash Classification on Embedded Device |
G A B C D E F G H J K L M N O P R S T U V W Y Z |
Gadhafi, Rida |
S10.2 |
|
Machine Learning Analysis of Atmospheric Effects on Electromagnetic Wave Propagation in the UAE |
Ganchev, Ivan |
S9.4 |
|
Novel SSD-Based Models for Detection of Multidimensional Pulmonary Nodules in CT Images |
S9.5 |
|
Impact of Channel Numbers and Training Epochs on U-Net's Polyp Segmentation Performance |
Gatera, Omar |
S2.6 |
|
Artificial Neural Network-Based IoT Device for Predicting the Electromagnetic Compatibility |
Gawanmeh, Amjad |
S5.6 |
|
An Intrusion Detection System for Detecting DDoS Attacks in Blockchain-Enabled IoMT Networks |
Ghaoud, Tareg |
S3.1 |
|
Sea Water Salinity Estimation over Dubai Using Satellite Imagery & WASI Empirical Model Approach |
Gourisaria, Mahendra |
S2.4 |
|
Time-Decay Attribution Model Using Half-Life in Exponential Decay for E-Commerce Conversion Analysis |
Guruprasad, Rachit Raam |
S6.4 |
|
Data Analysis of Dark Web Marketplaces Using Machine Learning |
H A B C D E F G H J K L M N O P R S T U V W Y Z |
Hadid, Abdenour |
S9.3 |
|
Neuromuscular Disease Detection from Electromyograms Using Convolutional and Recurrent Neural Nets |
Hamdan, Mohammad |
S8.5 |
|
Generative Adversarial Networks for Speech Enhancement |
Hammami, Hamze |
S1.3 |
|
BeeBetter: A Multi-Modular Beehive System for Honeybee Health Monitoring and Hazard Detection |
Hao, Shengnan |
S9.4 |
|
Novel SSD-Based Models for Detection of Multidimensional Pulmonary Nodules in CT Images |
Hashem, Ibrahim |
S9.7 |
|
Generalizable Spatiotemporal Deepfake Detection with Late-Fusion |
Hwata, Chiedza |
S2.6 |
|
Artificial Neural Network-Based IoT Device for Predicting the Electromagnetic Compatibility |
J A B C D E F G H J K L M N O P R S T U V W Y Z |
Jaiswal, Akash |
S10.6 |
|
AI-Powered Autonomous Building Cleaning Robots |
Jameela Manzil, Irfana Ilyas |
S2.1 |
|
Smart Soil Monitoring: Leveraging LoRa-Based IoT for Sustainable Agriculture 4.0 |
Javeed, Madiha |
S4.5 |
|
A Robust Fraud Detection System Using Deep Belief Network and Restricted Boltzmann Machines |
Ji, Zhanlin |
S9.4 |
|
Novel SSD-Based Models for Detection of Multidimensional Pulmonary Nodules in CT Images |
S9.5 |
|
Impact of Channel Numbers and Training Epochs on U-Net's Polyp Segmentation Performance |
K A B C D E F G H J K L M N O P R S T U V W Y Z |
K, Sowmiya |
S7.4 |
|
Enhanced Fault Detection and Classification of Wind Turbine Blades Using Machine Learning |
Karabayev, Nurdaulet |
S6.6 |
|
Design of Intrusion Detection and Security Enhancements in Military Wireless Sensor Networks |
Kashikar, Raj |
S10.5 |
|
Neuro-Symbolic AI for Self-Evolving Signal Processing in Autonomous Communication Systems |
Kechadi, Tahar |
S10.3 |
|
Evaluating Outputs Fusion Technique in Multimodal Human Activity Recognition |
Khaja, Tayeb |
S3.1 |
|
Sea Water Salinity Estimation over Dubai Using Satellite Imagery & WASI Empirical Model Approach |
Khalil, Ruhul Amin |
S2.2 |
|
Localization Performance Analysis in Agriculture 4.0 Utilizing Low Earth Orbit (LEO) Satellites |
Khanna, Abhirup |
S2.3 |
|
Federated Multi-Agent Reinforcement Learning for Incentive-Based DRS over Microgrids |
S2.5 |
|
Sustainable Industrial Energy Management: Multi-Agent Deep RL with GA and Digital Twins |
Kharoubi, Kamir |
S5.6 |
|
An Intrusion Detection System for Detecting DDoS Attacks in Blockchain-Enabled IoMT Networks |
Kim, Taehyeon |
S4.3 |
|
Wifi Channel State Information Sensing Based on Introspective Metric Learning |
Krini, Mohammed |
S8.1 |
|
Exploiting Combination of Spectral Features in Light Weight Neural Network for ABE on Limited Data |
Krishnan, Vineeth |
S3.4 |
|
Convolutional Deep Learning Hierarchical Classifier to Identify Synoptic Sky Conditions Based on Sky |
S3.5 |
|
A CNN-Based Classifier for Quality Image Selection from Sky Cameras |
S3.1 |
|
Sea Water Salinity Estimation over Dubai Using Satellite Imagery & WASI Empirical Model Approach |
Kumar, Karthick |
S6.3 |
|
Enhanced Hybrid Deep Learning Approach for Botnet Attacks Detection |
Kumar, Priyaranjan |
S8.6 |
|
SeizureNet-BiLSTM: A Hybrid Deep Learning Framework for Identifying Ictal and Interictal Phases |
Kurup, Abhishek |
S3.1 |
|
Sea Water Salinity Estimation over Dubai Using Satellite Imagery & WASI Empirical Model Approach |
L A B C D E F G H J K L M N O P R S T U V W Y Z |
Lakhlef, Hicham |
S5.6 |
|
An Intrusion Detection System for Detecting DDoS Attacks in Blockchain-Enabled IoMT Networks |
M A B C D E F G H J K L M N O P R S T U V W Y Z |
M, Bharathi |
S7.4 |
|
Enhanced Fault Detection and Classification of Wind Turbine Blades Using Machine Learning |
M, Parisa |
S7.6 |
|
Analysing Osteoporosis Detection: A Comparative Study of CNN and FNN |
M, Prabhananthakumar |
S6.3 |
|
Enhanced Hybrid Deep Learning Approach for Botnet Attacks Detection |
M Anzar, S |
S8.2 |
|
Performance Evaluation of Image Enhancement Techniques on Transfer Learning for Touchless Fingerprin |
Mahesh, CH |
S3.2 |
|
Data-Driven Predictive Analytics for Multi-Flight Departure Interdependencies in UAE Airspace |
Maheshwari, Piyush |
S2.3 |
|
Federated Multi-Agent Reinforcement Learning for Incentive-Based DRS over Microgrids |
S2.5 |
|
Sustainable Industrial Energy Management: Multi-Agent Deep RL with GA and Digital Twins |
Manandhar, Prajowal |
S3.4 |
|
Convolutional Deep Learning Hierarchical Classifier to Identify Synoptic Sky Conditions Based on Sky |
S3.5 |
|
A CNN-Based Classifier for Quality Image Selection from Sky Cameras |
Manjunath, TC |
S10.1 |
|
Underwater Wireless Communication System Design & Development Using Li-Fi Technology |
Mansoor, Wathiq |
S6.3 |
|
Enhanced Hybrid Deep Learning Approach for Botnet Attacks Detection |
S7.6 |
|
Analysing Osteoporosis Detection: A Comparative Study of CNN and FNN |
S10.2 |
|
Machine Learning Analysis of Atmospheric Effects on Electromagnetic Wave Propagation in the UAE |
S10.7 |
|
Detecting Brain Cancer Using Explainable AI |
Matsumura, Taisei |
S6.5 |
|
Explainable Anomaly Detection Method Using LLM Embeddings Model with SHAP |
Mitsunaga, Takuho |
S6.5 |
|
Explainable Anomaly Detection Method Using LLM Embeddings Model with SHAP |
Mohammad, Ibrahim |
S4.6 |
|
Anti-Forensic Challenges in Digital Forensics Investigations: An Overview of Techniques and Tools |
Mohammedhussain, Rizwan |
S3.3 |
|
Enhancing Distribution Network Reliability Through IoT-Driven Alarm Systems |
Mohan, Neethu |
S1.4 |
|
Heart Rate Estimation from Photoplethysmography Signals Using Fast Fourier Transform |
S1.5 |
|
Camera-Based Remote Heart Rate Monitoring Using Photoplethysmography |
Mukhtar, Husameldin |
S3.6 |
|
Machine Learning-Driven Fault Detection System for Electrical Networks |
S10.2 |
|
Machine Learning Analysis of Atmospheric Effects on Electromagnetic Wave Propagation in the UAE |
Murugan, M Thangavel |
S5.5 |
|
Research Study on DNA-Based Cryptosystem for Cloud, IoT, and Edge Computing Networks |
Muthalagu, Raja |
S5.3 |
|
Blockchain-Powered Asset Tokenization Platform |
S8.3 |
|
A Driver Rating System Based on Driving Pattern |
N A B C D E F G H J K L M N O P R S T U V W Y Z |
N, Nasurudeen Ahamed |
S5.5 |
|
Research Study on DNA-Based Cryptosystem for Cloud, IoT, and Edge Computing Networks |
Nasar, Amer |
S4.6 |
|
Anti-Forensic Challenges in Digital Forensics Investigations: An Overview of Techniques and Tools |
Nasir, Nida |
S4.2 |
|
Optimized Shape Design of a Dual-Band Circular Slot High Gain Array Antenna Using Genetic Algorithm |
Nasser, Faris |
S1.6 |
|
Fall Detection Using Wi-Fi Channel State Information |
Nathwani, Karan |
S8.1 |
|
Exploiting Combination of Spectral Features in Light Weight Neural Network for ABE on Limited Data |
Nyakuli, Jean Pierre |
S2.6 |
|
Artificial Neural Network-Based IoT Device for Predicting the Electromagnetic Compatibility |
O A B C D E F G H J K L M N O P R S T U V W Y Z |
Okada, Satoshi |
S6.5 |
|
Explainable Anomaly Detection Method Using LLM Embeddings Model with SHAP |
P A B C D E F G H J K L M N O P R S T U V W Y Z |
Pachori, Ram Bilas |
S9.8 |
|
A Simple Automated VT/VF Detection Method for Resource-Constrained Arrhythmia Monitoring Devices |
Panda, Asit |
S8.4 |
|
Impulse Radio UWB Radar-Based Respiration Rate Estimation Method Under Clutter Environments |
Pang, Jianhua |
S9.4 |
|
Novel SSD-Based Models for Detection of Multidimensional Pulmonary Nodules in CT Images |
Panthakkan, Alavikunhu |
S6.3 |
|
Enhanced Hybrid Deep Learning Approach for Botnet Attacks Detection |
S5.3 |
|
Blockchain-Powered Asset Tokenization Platform |
S7.2 |
|
Automated Cuneiform Symbol Detection and Translation Using Deep Learning Techniques |
S8.2 |
|
Performance Evaluation of Image Enhancement Techniques on Transfer Learning for Touchless Fingerprin |
S8.3 |
|
A Driver Rating System Based on Driving Pattern |
S7.6 |
|
Analysing Osteoporosis Detection: A Comparative Study of CNN and FNN |
Park, Se-Ho |
S4.3 |
|
Wifi Channel State Information Sensing Based on Introspective Metric Learning |
Pawar, Pranav |
S5.3 |
|
Blockchain-Powered Asset Tokenization Platform |
S8.3 |
|
A Driver Rating System Based on Driving Pattern |
PD, Dilavar |
S8.2 |
|
Performance Evaluation of Image Enhancement Techniques on Transfer Learning for Touchless Fingerprin |
Petros, Fanuel |
S7.3 |
|
Performance Evaluation of Deep Learning Models for Real-Time Trash Classification on Embedded Device |
Philippe, Mikael |
S10.2 |
|
Machine Learning Analysis of Atmospheric Effects on Electromagnetic Wave Propagation in the UAE |
Phukan, Nabasmita |
S9.8 |
|
A Simple Automated VT/VF Detection Method for Resource-Constrained Arrhythmia Monitoring Devices |
Pillai, Deepangika |
S9.2 |
|
Development and Evaluation of Nao Humanoid Robot for Rehabilitation Therapy |
Pomares, Luis |
S3.4 |
|
Convolutional Deep Learning Hierarchical Classifier to Identify Synoptic Sky Conditions Based on Sky |
S3.5 |
|
A CNN-Based Classifier for Quality Image Selection from Sky Cameras |
S3.1 |
|
Sea Water Salinity Estimation over Dubai Using Satellite Imagery & WASI Empirical Model Approach |
Poon, Kin |
S1.2 |
|
Bilingual Speech Recognition on the Edge Using Machine Learning |
S1.6 |
|
Fall Detection Using Wi-Fi Channel State Information |
Punjabi, Prateek |
S8.5 |
|
Generative Adversarial Networks for Speech Enhancement |
R A B C D E F G H J K L M N O P R S T U V W Y Z |
R, Geetha |
S7.6 |
|
Analysing Osteoporosis Detection: A Comparative Study of CNN and FNN |
R, Tamilselvi |
S7.6 |
|
Analysing Osteoporosis Detection: A Comparative Study of CNN and FNN |
Rahate, Mrudula |
S5.2 |
|
Predicting Chargeback Fraud Using Data Mining Techniques |
Rahman, Abdul |
S10.7 |
|
Detecting Brain Cancer Using Explainable AI |
Ramachandran, Balaji |
S3.3 |
|
Enhancing Distribution Network Reliability Through IoT-Driven Alarm Systems |
Randazzo, Andrea |
S10.4 |
|
Noncontact Measurement of Sea Wave Dynamics and Velocity Estimation with a Low-Cost FMCW Radar |
Rao, Pratham |
S6.4 |
|
Data Analysis of Dark Web Marketplaces Using Machine Learning |
Rapate, Gauri |
S6.4 |
|
Data Analysis of Dark Web Marketplaces Using Machine Learning |
Rezk, Mahmoud |
S3.4 |
|
Convolutional Deep Learning Hierarchical Classifier to Identify Synoptic Sky Conditions Based on Sky |
S3.5 |
|
A CNN-Based Classifier for Quality Image Selection from Sky Cameras |
Rushingabigwi, Gerard |
S2.6 |
|
Artificial Neural Network-Based IoT Device for Predicting the Electromagnetic Compatibility |
S A B C D E F G H J K L M N O P R S T U V W Y Z |
S, Arulselvi |
S7.6 |
|
Analysing Osteoporosis Detection: A Comparative Study of CNN and FNN |
S, Rathnamala |
S6.3 |
|
Enhanced Hybrid Deep Learning Approach for Botnet Attacks Detection |
Saad, Mohamed |
S5.1 |
|
Enhanced Channel Estimation for Multi-Tag Ambient Backscatter Communication Systems |
Sabarimalai Manikandan, M |
S8.4 |
|
Impulse Radio UWB Radar-Based Respiration Rate Estimation Method Under Clutter Environments |
S9.8 |
|
A Simple Automated VT/VF Detection Method for Resource-Constrained Arrhythmia Monitoring Devices |
Saeed, Nasir |
S2.2 |
|
Localization Performance Analysis in Agriculture 4.0 Utilizing Low Earth Orbit (LEO) Satellites |
S2.1 |
|
Smart Soil Monitoring: Leveraging LoRa-Based IoT for Sustainable Agriculture 4.0 |
Sahadevan, Deepudev |
S3.2 |
|
Data-Driven Predictive Analytics for Multi-Flight Departure Interdependencies in UAE Airspace |
Salahudin, Maham |
S3.2 |
|
Data-Driven Predictive Analytics for Multi-Flight Departure Interdependencies in UAE Airspace |
Sardar, Abdul Wasay |
S7.1 |
|
Deep Learning Based UAV Assisted Distributed Platform for Crowd Source Management |
Sayed, Samir |
S6.1 |
|
Bluffing the Hackers: Automated Decoy Creation and Real-Time Cyber Deception |
S6.2 |
|
Automating Cyber Defense: Enhancing Threat Intelligence with AI-Driven Annotation |
Sharma, Anil |
S10.7 |
|
Detecting Brain Cancer Using Explainable AI |
Shetty, Omkaar |
S6.4 |
|
Data Analysis of Dark Web Marketplaces Using Machine Learning |
Siddiqui, Lubna |
S1.1 |
|
Towards Quantum-Inspired Evolutionary Algorithms for Denoising PCG Signals |
Singh, Jaspal |
S1.1 |
|
Towards Quantum-Inspired Evolutionary Algorithms for Denoising PCG Signals |
Sinha, Aaryan |
S5.3 |
|
Blockchain-Powered Asset Tokenization Platform |
Sohail, Shahab |
S10.7 |
|
Detecting Brain Cancer Using Explainable AI |
Sreekumar, Sreelakshmi |
S8.3 |
|
A Driver Rating System Based on Driving Pattern |
Sridhar, Kv |
S9.6 |
|
Brain Tumor Classification Using Enhanced CNN and Optimization with Metaheuristic Algorithms |
Subramanian, Vinod |
S3.3 |
|
Enhancing Distribution Network Reliability Through IoT-Driven Alarm Systems |
Suliman, Ahmed |
S1.6 |
|
Fall Detection Using Wi-Fi Channel State Information |
T A B C D E F G H J K L M N O P R S T U V W Y Z |
T, Vijayashanthi |
S6.3 |
|
Enhanced Hybrid Deep Learning Approach for Botnet Attacks Detection |
Tagmouni, Abdelkader |
S10.3 |
|
Evaluating Outputs Fusion Technique in Multimodal Human Activity Recognition |
Tettey, Daniel |
S4.4 |
|
Dual-Channel Visible Light Communication System for Enhanced V2V Video Streaming |
Thumula, Gopi |
S7.5 |
|
GuardNet: An Ensemble-Based Malware Detection Model Using Machine Learning |
Tiwari, Varun |
S3.4 |
|
Convolutional Deep Learning Hierarchical Classifier to Identify Synoptic Sky Conditions Based on Sky |
S3.5 |
|
A CNN-Based Classifier for Quality Image Selection from Sky Cameras |
U A B C D E F G H J K L M N O P R S T U V W Y Z |
Ul Haq, Qazi Emad |
S4.6 |
|
Anti-Forensic Challenges in Digital Forensics Investigations: An Overview of Techniques and Tools |
Ullah, Farman |
S7.1 |
|
Deep Learning Based UAV Assisted Distributed Platform for Crowd Source Management |
Upadhyay, Prabhat |
S8.6 |
|
SeizureNet-BiLSTM: A Hybrid Deep Learning Framework for Identifying Ictal and Interictal Phases |
Uysal, Murat |
S4.4 |
|
Dual-Channel Visible Light Communication System for Enhanced V2V Video Streaming |
V A B C D E F G H J K L M N O P R S T U V W Y Z |
V, Sarasvathi |
S6.4 |
|
Data Analysis of Dark Web Marketplaces Using Machine Learning |
Vandavasi Karunamurthy, Jayakumar |
S3.3 |
|
Enhancing Distribution Network Reliability Through IoT-Driven Alarm Systems |
W A B C D E F G H J K L M N O P R S T U V W Y Z |
Watarai, Koki |
S6.5 |
|
Explainable Anomaly Detection Method Using LLM Embeddings Model with SHAP |
Y A B C D E F G H J K L M N O P R S T U V W Y Z |
Y. Almadhaani, Rayah |
S10.2 |
|
Machine Learning Analysis of Atmospheric Effects on Electromagnetic Wave Propagation in the UAE |
Yemane, Tomas |
S7.3 |
|
Performance Evaluation of Deep Learning Models for Real-Time Trash Classification on Embedded Device |
Z A B C D E F G H J K L M N O P R S T U V W Y Z |
Zamzam, Marwa |
S6.1 |
|
Bluffing the Hackers: Automated Decoy Creation and Real-Time Cyber Deception |
S6.2 |
|
Automating Cyber Defense: Enhancing Threat Intelligence with AI-Driven Annotation |
Zerguine, Azzedine |
S4.1 |
|
Connected Graph Multitask Diffusion LMS via Orthonormal Codes in Ad-Hoc Networks |
Zhukabayeva, Tamara |
S6.6 |
|
Design of Intrusion Detection and Security Enhancements in Military Wireless Sensor Networks |
Zia, Tanveer |
S4.6 |
|
Anti-Forensic Challenges in Digital Forensics Investigations: An Overview of Techniques and Tools |