Default Cover Image

2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE)

July 24 2023 to July 27 2023

Las Vegas, NV, USA

ISBN: 979-8-3503-2759-5

Table of Contents

Half Title PageFreely available from IEEE.pp. 1-1
Half Title PageFreely available from IEEE.pp. 1-1
Copyright PageFreely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-li
Message from the Co-Chairs: CSCE 2023Freely available from IEEE.pp. liii-liv
Conference Organization: CSCE 2023Freely available from IEEE.pp. liv-lv
Bootcamp Method for Training General Purpose AI AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Communication-Facilitated Coordination in Agent Team Rescue MissionFull-text access may be available. Sign in or learn about subscription options.pp. 19-22
Deep Learning Evolved: Overcoming Sub-Optimal Local Minima with (\mu/\rho+\lambda)–Evolution StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 37-45
Microgrid Intelligent Agent ControlFull-text access may be available. Sign in or learn about subscription options.pp. 53-57
Can CNNs be Used to Predict Multi-Physics Simulations of Microwave Induced Damage to Basalt?Full-text access may be available. Sign in or learn about subscription options.pp. 58-61
mCLESS: The Multi-Class Least-Error Square Sum for Interpretable ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 62-67
Comparative Analysis of Deep Learning Approaches for Analysis and Prediction of Multivariate Time Series DataFull-text access may be available. Sign in or learn about subscription options.pp. 76-82
BERT Goes to SQL School: Improving Automatic Grading of SQL StatementsFull-text access may be available. Sign in or learn about subscription options.pp. 83-90
A Reinforcement Learning Approach to Training Chess Engine Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 91-95
Assessing Author Personality Types Using ChatGPTFull-text access may be available. Sign in or learn about subscription options.pp. 96-101
Determinants of Global Hunger IndexFull-text access may be available. Sign in or learn about subscription options.pp. 102-107
Performance Evaluation of Federated Learning for Anomaly Network DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 116-122
Scaling Probabilistic Inference Through Message Contraction OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 123-130
Detecting IoT Malware with Knowledge Distillation TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 131-135
A Multi-Agent System for ISR Asset PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 136-144
AI Resistant (AIR) CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 145-149
Analysis of Factors Influencing the Severity of Coronavirus Symptoms Using Predictive ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 157-162
Automated Orchestration Systems Based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 163-167
An Analysis of Research Trends on Language Model Using BERTopicFull-text access may be available. Sign in or learn about subscription options.pp. 168-172
Reinforcing a Monitoring System of a Regulated River Using LSTMFull-text access may be available. Sign in or learn about subscription options.pp. 210-214
Fine-Tuned Large Language Models for Improved Clickbait Title DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 215-220
Accurately Forecasting the Energy Cost in Home-Based Small Businesses by Applying Deep Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 221-227
Evolving Efficient CNN Based Model for Image ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 228-235
Transformers for Network Traffic PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 236-240
A SQL-Based Probabilistic InferenceFull-text access may be available. Sign in or learn about subscription options.pp. 241-245
Visual Memory Transfer for Imbalanced Medical Image ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 254-260
Defense of Military Installations from UAV-Borne Attacks using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 266-273
Regression Models for Solar Radiation PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 274-281
A Clovis/Solutrean Projectile-Point Image ClassifierFull-text access may be available. Sign in or learn about subscription options.pp. 282-286
Exploring Automatic Malware Detection Through Deep Learning ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 287-294
Digital Rubber Duck: Leveraging Large Language Models for Extreme ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 295-304
Trash Classification Using Deep Learning ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 318-323
Predicting Ocean Wave Fun Factor with Machine Learning Using Buoy Data and Human ObservationsFull-text access may be available. Sign in or learn about subscription options.pp. 324-331
Federated Learning for Character Prediction for Text GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 361-365
Construction of Concept-Base Including Internet-Derived WordsFull-text access may be available. Sign in or learn about subscription options.pp. 366-369
Designing User-Centered Artificial Intelligence to Assist in Recovery from Domestic AbuseFull-text access may be available. Sign in or learn about subscription options.pp. 375-377
Short Review on Supervised Learning Under Adversarial Label Poisoning and Clean-Label Data PoisoningFull-text access may be available. Sign in or learn about subscription options.pp. 378-382
Large Language Model (LLM) & GPT, A Monolithic Study in Generative AIFull-text access may be available. Sign in or learn about subscription options.pp. 383-388
Comparison of Standard Machine Learning Classification Methods Using a Mammogram DatasetFull-text access may be available. Sign in or learn about subscription options.pp. 389-392
Is Gamification a Practical Solution for Increasing Repurchase Intention of Online Customers?Full-text access may be available. Sign in or learn about subscription options.pp. 393-398
Improving Energy Efficiency in Healthcare Machine Learning ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 399-404
LLM/GPT Generative AI and Artificial General Intelligence (AGI): The Next FrontierFull-text access may be available. Sign in or learn about subscription options.pp. 413-417
Harnessing the Speed and Accuracy of Machine Learning to Advance CybersecurityFull-text access may be available. Sign in or learn about subscription options.pp. 418-421
A Comparative Study of DE, GA and ES for Evolutionary Reinforcement Learning of Neural Networks in Pendulum TaskFull-text access may be available. Sign in or learn about subscription options.pp. 426-428
Reinforcement Learning Based Production Planning in the Aquaculture IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 434-438
Gender Analysis of European Job Offers Through NLP TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 439-445
A Control Engineering Approach to the Ripple Effect Analysis in Closed-Loop Supply ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 446-450
Modified K-Means Clustering Algorithms for Feature SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 461-469
Graph-Oriented Modelling of Process Event Activity for the Detection of MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 477-486
Artificial Emotional Intelligence Testing for AI AvatarsFull-text access may be available. Sign in or learn about subscription options.pp. 487-496
Cognitive Cluster IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 497-503
Predicting Drug Response Using Two Factors From Cell Lines-Drug Sensitivity and Basal Gene ExpressionFull-text access may be available. Sign in or learn about subscription options.pp. 522-525
A Research Agenda on the Feasibility of the Proposed 5G Enabled Use Cases on HealthcareFull-text access may be available. Sign in or learn about subscription options.pp. 526-529
Vision Transformers and Bi-LSTM for Alzheimer's Disease Diagnosis from 3D MRIFull-text access may be available. Sign in or learn about subscription options.pp. 530-535
Deep Learning-Based MR Image Re-parameterizationFull-text access may be available. Sign in or learn about subscription options.pp. 536-541
Using Human Body Recognition to Assist Hospital Caregivers with Turning Immobile PatientsFull-text access may be available. Sign in or learn about subscription options.pp. 548-552
From Floats To Posits: A Conversion FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 553-557
Pairwise Adaptive Timesteps for Soft-Sphere Collisions in Ring SimulationsFull-text access may be available. Sign in or learn about subscription options.pp. 558-564
Task-Based Content Delivery at the Wi-Fi EdgeFull-text access may be available. Sign in or learn about subscription options.pp. 565-572
Showing 100 out of 461