2024
International Conference on Intelligent Computing, Communication, Networking
and Services (ICCNS)
Copyright © 2024 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved.
Copyright and Reprint Permission: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint or republication permission, email to IEEE Copyrights Manager at pubs-permissions@ieee.org. All rights reserved. Copyright ©2024 by IEEE.
IEEE Catalog Number: CFP24DQ5-ART
ISBN: 979-8-3503-5469-0
Table of Contents (Click on the paper title to access the paper)
ICCNS2024 |
|
|
|
Decoding Ideology: Machine
learning-based Detection of Extremist Content Shynar Mussiraliyeva,
Kymbat Baisylbayeva, Milana Bolatbek and Zhastay Yeltay |
|
|
Securing IoT with Resilient Cloud-Edge Continuum Engin Zeydan, Awaneesh Kumar Yadav, Pasika Ranaweera and Madhusanka Liyanage |
|
|
Service Function Chaining via SR-MPLS over P4: A rudimentary analysis Martins Mihaeljans, Andris Skrastins and Jurgis Porins |
|
|
Link Fabrication Attack Detection for Software Defined Networks Adisaya Charoenphol and Martin Reed |
|
|
A Light Gradient Residual Encoder-Decoder Network for Multimodal Image Fusion Muhammad Ishfaq Hussain, Prof. Jeonghwan Gwak and Prof. Moongu Jeon |
|
|
HePiLUT: Resource Efficient Heterogeneous Pipelined CNN Accelerator for FPGAs Rashed Al Amin, Md Shahi Amran Hossain and Roman Obermaisse |
|
|
The SEIR Model for Predicting Malware
Propagation in Computer Networks Mohammad Kharabsheh, Issa Al-Aiash, Ala Mughaid and
Muder Almiani |
|
|
Resource-Efficient FPGA Implementation
for Real-Time Breast Cancer Classification Using Custom CNNs Rashed Al Amin and Roman Obermaisser |
|
|
Lucas Harvey and Gautam Srivastava |
|
|
A Secure IoT Framework for Remote
Health Monitoring Using Fog Computing Alaa Harasees, Bilal Al-Ahmad, Anas Alsobeh and Abdullah Abuhussein |
|
|
Data-Driven Unified Channel Modeling of WiFi and LiFi Using Conditional GAN Amal Saif, Rahmeh Ibrahim, Sufyan Almajali
and Haythem Bany Salameh |
|
|
Analysis of Fraudulent Job Postings
Using Machine Learning Said Salloum, Khalaf Tahat, Ahmed
Mansoori, Dina Tahat and Raghad Alfaisal |
|
|
Inter-Radar Interference Mitigation by
Multi-Channel RNN with Multi-head Self-Attention Yudai Suzuki, Xiaoyan Wang and Mashahiro
Umehira |
|
|
Alex Kaplunovich |
|
|
Evaluating Diverse LLMs: How GDP
Influences Responses to Gender and Diversity Questions Alex Kaplunovich |
|
|
Large Language Models for Knowledge
Discovery in Healthcare Shadi Alzubi, Tarek Kanan and Muder Almiani |
|
|
Abdelmadjid Benarfa, Sofiane Dahmane
and Bouziane Brik |
|
|
Digital Forensic Investigations on
Cyber Physical Production Systems: A Systematic Literature Survey Norman Nelufule, Pertunia
Senamela, Hunadi Mawela
and Molebogeng Latakgomo |
|
|
Said Salloum, Khalaf Tahat, Ahmed
Mansoori, Dina Tahat and Raghad Alfaisal |
|
|
Variance-Preserving
Stochastic Differential Equation Algorithm for the Traveling Salesman Problem Wang Yuchen and Ebara Hiroyuki |
|
|
Anastasios Giannopoulos, Ilias Paralikas,
Sotirios Spantideas and Panagiotis Trakadas |
|
|
Cobra-5G – an AI-driven Solution for
Resilient Industrial Applications in Private 5G Environments Sebastian Peters, Fikret Sivrikaya, Satyatma Winarga Rochadi and
Amina Ayadi-Miessen |
|
The International Symposium on
Intelligent Digitization of Systems and Services (IDSS2024) |
|
|
|
Mohamed Elzeiny, Ibtehal
Aburezeq, Suad Alwaely,
Mohammad Faqeeh, Nagwa Abdo, Asmaa Almahdawi and Albandari Alahbab |
|
|
Riadh Jeljeli, Faycal
Farhi, Samira Setoutah, Yamine
Boudhane, Khaled Zamoum, Alaaldin Zahra and Mouna Farhi |
|
|
Sawsan Taha, Rahima Aissani and Rania Abdallah |
|
|
Firas Tayseer Ayasrah, Khaleel Alarabi, Jihan Yousef, Aprilla Fortuna, Dony Novaliendry and Hanan Nassar Aljermawi |
|
|
The Ethics of Applying Artificial
Intelligence (AI) for Communication Governance Reneh Abokhoza, Khawlah
M. Altkhayneh, Reema Al Qaruty,
Samer Abdel Hadi and Ziyad Kamel Ellala |
|
|
OpenCV and Its Applications in
Artificial Intelligent Systems Ayman Odeh and Nada Odeh |
|
|
Ahmad Aljumah, Mohammed. T. Nuseir, Ghaleb Elrefae and
Amer Qasim |
|
|
Physics Without Walls: Online Learning
Journey Khaleel Alarabi, Firas Ayasrah, Jihan Yousef, Majed El-Saleh and Najeh Alsalhi |
|
|
Ghaleb El Refae, Ahmad Aljumah and Mohammed Nuseir |
|
|
Mohammed. T. Nuseir, Ahmad Aljumah and Ghaleb Elrefae |
|
|
Enhancing IoT Security through
Hardware Security Modules (HSMs) Mansoor Khan, Muhammad Ilyas and Oguz Bayat |
|
|
The Influence of Big Data Analytics on
Strategic Decision-Making - A Quantitative Study Faycal Farhi, Riadh Jeljeli,
Merhan Mohsen, Faten Ben Lagha,
Khaled Zamoum, Alaaldin
Zahra and Mouna Farhi |
|
|
Clustering Medical Transcriptions
Using K-Means Said Salloum, Dina Tahat, Khalaf Tahat, Ayham Salloum and Raghad Alfaisal |
|
|
Farah Saboune |
|
ACAIoT 2024 |
||
|
Vehicle Trajectory-Based Intersection Classification Using Deep
Transfer Learning Abanoub Kased, Rana Rabee, Akram Fahmy, Hussein Mohamed, Marco
Yacoub, Mohammed Elhenawy, Huthaifa
I. Ashqar, Anas Alsobeh, Mahmoud Masoud and
Abdallah A. Hassan |
|
|
Blockchain-Based National Digital
Identity Framework -- Case of Palestine Firas Abu Hasan, Huthaifa I. Ashqar,
Anas Alsobeh and Omar Darwish |
|
|
Explainable-AI for DoS Attacks
Detection in 5G Network using Deep Learning Models Amjad Albashayreh, Yahya Tashtoush, Abdallah Aldosary,
Omar Darwish and Firas Albalas |
|
|
K-Means Artificial Intelligence
Clustering Technique for 6G Propagation Channels Saud Alhajaj Aldossari |
|
|
Optimizing Phishing URL Detection: A
Comparative Analysis of Feature Counts and Training Times Moayyad Alajlouni, Yahya Tashtoush, Saud Alhajaj Aldossari and Omar Darwish |
|