


default search action
14th ICSCA 2025: Kuala Lumpur, Malaysia
- Proceedings of the 14th International Conference on Software and Computer Applications, ICSCA 2025, Kuala Lumpur, Malaysia, February 20-23, 2025. ACM 2025, ISBN 979-8-4007-1012-4
Chapter 1 Data Model Design And Algorithm Optimization
- Fazrul Ridha Alliandre, Erna Hikmawati:
Enhancing Panic Attack Predictions: Addressing Data Imbalance in Machine Learning Models. 1-5 - Ihfan Aditya Ghafur, Lukman Abdurrahman, Seno Adi Putra:
Utilization of Process Mining to Analyze and Identify Improvement Opportunities in the New Student Admission Process. 6-12 - Pannag Kumaar, Himank Bansal, Maryam Khan, Tania Somanna N, Sarasvathi V:
Breaking the Trackers: A Multi-Module Privacy Framework through Fingerprint Injection and Data isolation. 13-19 - Yee Jian Chew, Shih Yin Ooi, Ying-Han Pang:
Forest Fire Inventory Dataset for Peninsular Malaysia (2001-2023) Generated Using a Framework with Google Earth Engine and Multi-Source Remote Sensing Data. 20-26 - Suyog K, Sushmitha T, Swathi, Uttam Ballal, Prema Ramasay:
Stock Portfolio risk analysis using multimodal data. 27-32
Chapter 2 Data-based Intelligent Computing and Information Management
- Raed Shatnawi Shatnawi:
Prioritizing Bugs using Stack Overflow Posts. 33-39 - Daniel Vietz, Johanna Barzen, Martin Beisel, Frank Leymann, Lavinia Stiliadou, Benjamin Weder:
Harnessing Patterns to Support the Development of Hybrid Quantum Applications. 40-46 - Tingting Huang, Akinori Yokota, Ken-ichi Suzuki:
An Empirical Study of Risk Management Approaches in Information Systems Development Projects from the Vendor's Perspective: Evidence from Japan. 47-54 - Kengo Matsui, Shigeki Hagihara:
Design and Implementation of a Compact Educational Blockchain System to Aid Understanding of System Integrity and Behavior. 55-59
Chapter 3 Data-oriented Information System Optimization and Security Certification
- Noriyoshi Ozawa, Satoru Sunahara, Shigeki Hagihara:
Evaluation Criteria for Explainable AI in Intrusion Detection to Ensure the Creation of High-Quality Threat Intelligence. 60-66 - Karthik Nallapula, Sai Rahul Reddy Kona, Akshay Vutti, Hansika Pagadala, Gauri Sameer Rapate:
Road Incident Detection System. 67-71 - S. M. Zia Ur Rashid, Mohammad Makchudul Alam, Irfanul Montasir, Ashfaqul Haq:
Risk-Based MITRE TTP Scoring for Proactive Cyber Threat Prioritization and Response. 72-76 - Glicerio A Baguia, Chris Jordan Aliac, Larmie S. Feliscuzo, Cherry Lyn Cando Sta. Romana:
Integrating Cryptocurrency and Fiat Payments for a Serverless Water Billing System on Hyperledger Fabric Serverless Water Billing System on Hyperledger Fabric. 77-83
Chapter 4 Software Design, Testing and Security Verification
- Sarmad Soomro, Ahsanullah Abro:
Designing Layout-Agnostic Stencils to Minimize Visual Distraction in In-Vehicle Touchscreens. 84-89 - Sandro Hartenstein:
Bridging the Security Gap: An Empirical Analysis of LLM-API Integration Vulnerabilities and Mitigation Strategies. 90-95 - Hussein Ali Al Hashimi:
An Empirical Exploration of Cybersecurity Threats and Mitigation Strategies in Software Testing. 96-106 - Masaki Saito, Akira Sasaki, Hiroshi Hosobe:
Case Studies Toward Introducing Liveness on Interactive System Development with p5.js. 107-114 - Oualid Miloudi, Elmoukhtar Zemmouri:
OpenMIP: Towards an Open Toolkit for Medical Image Processing. 115-119 - Roslina Mohd Sidek, Kamal Z. Zamli, Rozlina Mohamed:
Multi-Task Test Redundancy Reduction Optimization Problem based on the Brown Bear Algorithm. 120-125 - Sarmad Soomro, Ahsanullah Abro:
Beyond One-Size-Fits-All: An Experimental Study on Evaluating Layout-Agnostic Tactile Stencils for In-Vehicle Touchscreen Interaction. 126-131
Chapter 5 Computational Models and Methods in Advanced Information Systems
- Haider Ali, Zartasha Mustansar:
Biomechanics of Lumber Spine using Microstructurally Realistic 3D Finite Element Modeling. 132-136 - Ayesha Inam Tarar, Zartasha Mustansar, Hafiz M. Yasir Bhatti, Khujasta Khalid, Waqar Ahmad Malik, Mohaira Ahmad:
Design and Development of non-invasive RF-Based Prototype for Bone Health Evaluation. 137-141 - Ayesha Jan, Zartasha Mustansar, Syed Irtiza Ali Shah:
Innovative Modeling Approach to Investigate Joint Loading in Astronaut Biomechanics. 142-147 - MD Tasadul Islam Hemal, Yew Keong Sin, Ahmad Farimin Ahmad Osman, Yi-Fei Tan:
Prediction of Standard Minute Value Using Machine Learning in the Garment Industry. 148-153 - Ghifari Munawar, Nur Ulfa Maulidevi, Kridanto Surendro:
Proposed Feature Dimensionality Reduction Method in a Predictive Model for Carbon Neutrality: A Hybrid Quantum-Classical Approach. 154-160 - Chang Liu, Xingli Zhang, Jiannong Shi:
Multilevel Structural Equation Model Analysis Using Mplus : The Cross-level Role of Creative Classroom Environment in Children's Creativity Education. 161-171
Chapter 6 Image Recognition and Classification
- Masayuki Okabe:
Time Series Classification with Composite Shapelets. 172-176 - Keysed Ian Vargas Mahor, Meo Vincent Comia Caya, Jocelyn Flores Villaverde:
Development of Natural Fiber Classification System using Deep Convolutional Neural Network. 177-182 - Raymart Oquingan Villena, Jocelyn Flores Villaverde:
Classification of Black Garlic Grade Using Convolutional Neural Network. 183-190 - Yan Zhang, Jiacheng Li, Masato Noto:
Application of a Hybrid CNN-SE-GCN Model with Multi-Loss Optimization and Adversarial Samples in Real-Time Emotion Recognition. 191-197 - Siew-Chin Chong, Lee-Ying Chong, Kuok-Kwee Wee:
Enhancing Masked Face Recognition with Real-Time Eye Blink Detection for Secure Access Control. 198-203
Chapter 7 Vision-based Digital Image Analysis and Processing Technology
- Otmane Azeroual, Renaud Fabre, Radka Nacheva:
Modeling and Visualizing Human Experience in a Knowledge Graph: Understanding and Predicting Emotional Reactions to Life Events. 204-213 - Joseph Benedict Bacanto Espiritu, Edrick Rabina Madlangbayan, Jocelyn Flores Villaverde:
Copra Dryness Assessment using ResNet50. 214-220 - Danendra Satriyo Buwono, Erna Hikmawati:
Enhancing Lung Cancer Diagnosis Prediction: A Feature Selection Approach to Improve Model Performance. 221-226 - Sai Charan Papineni, Oshin Saraf, Karun Vr, Sai Krishna Muralidharan:
Beyond The Bat: A Novel Video-Based Framework For Cricket Technique Emulation Through Image Processing. 227-231
Chapter 8 Intelligent Image Detection and Analysis Methods
- Pearl Joy Bernardo Rima, Jocelyn Flores Villaverde:
Detection and Identification of Abaca Plant Pests and Diseases using Computer Vision and Deep Neural Network. 232-237 - Masashi Katsumata:
Learner Face Detection and Analysis in Smart Learning Environments. 238-241 - Nishita N. Joshi, Keertiraj Krishna Vernekar, Shriya Barad, Shruthi Venkatraman, Shruthi M. L. J:
Performance Analysis of ML Models: An Overlook through the Perspective of VOCs to Detect Lung and Liver Cancer. 242-247 - Zhipeng Yu, Haonan Qin, Han Jiang, Pengfei Zhang:
Self-Attention-Enhanced Framework for Multi-Label Fundus Disease Detection in Imbalanced Datasets. 248-253
Chapter 9 Machine Learning Models and Intelligent Computing
- Rigel Rafiq Setiawan, Erna Hikmawati:
Enhancing Machine Learning Accuracy in Water Quality Assessment and Potability Prediction Using Imputation and Balancing Techniques. 254-259 - Lim Yong Sheng, Musa Mohd Mokji:
Proposing New Criteria for Early Stopping in CNN Training: A Step Towards Optimal Training. 260-266 - Wahyu Hidayat, Nur Ulfa Maulidevi, Kridanto Surendro:
Designing a Quantum Annealing-Based Method for Optimizing Backpropagation Neural Networks in Greenhouse Gas Emissions Prediction. 267-272 - Luthfi Revansyah Pratama, Erna Hikmawati:
Enhancing Predictive Accuracy in Agricultural Land Suitability with Machine Learning Using Feature Selection and Data Balancing. 273-278 - Abdallah Qusef, Hatem Mosa, Ammar El-Hassan:
Improving Fake News Detection in Arabic Using ML and DL Algorithms. 279-283 - Muhammad Haikel Nur Kamil Putra Mulyana, Erna Hikmawati, Rizza Indah Mega Mandasari:
Enhancing Global Air Quality Classification Using Efficient Machine Learning Techniques. 284-289 - Ge-Zhi Zhao, Yi-Fei Tan, Hezerul Abdul Karim, Tze-Hang Cheeng, Ching-King Chia:
Leveraging Machine Learning Techniques to Obtain Data for Virtual Sensors. 290-294 - Rafi Bagus Prayoga, Erna Hikmawati, Rizza Indah Mega Mandasari:
Improving Predictive Accuracy of Sales and Satisfaction Analysis Using Mean Imputation and Machine Learning Models. 295-300 - Vitaliy Mezhuyev, Sabine Hanusch, Paul Hofmann, Manfred Mücke:
ML Model for Predicting Tensile Strength of 3D-Printed Components Using Bayesian Optimization. 301-306
Chapter 10 Artificial Intelligence Theory and Application
- Dina Oralbekova, Orken Mamyrbayev, Ainur Akhmediyarova, Dinara Kassymova, Alibiyeva Zhibek:
Using Kazakh NER Datasets for Multiclass Classification in the Legal Domain: a Comparative Study of Bert, GPT, and LSTM Models. 307-312 - Zan-Kai Chong, Hiroyuki Ohsaki, Bryan Ng:
LLM-Net: Democratizing LLMs-as-a-Service through Blockchain-based Expert Networks. 313-320 - Karthik Namboori, Rohit P. Suresh, Sathwik Hj, Shriansh Mohanty, Jayashree Rangareddy:
Distributed Inference of Large Language Models on Edge Devices. 321-326 - Anh Hong Nguyen, Duc Minh Nguyen, Anh Duc Do, Lan Thi Ha Nguyen, Minh Hong Pham, Anh Thi Minh Do, Ban Quy Tran:
Integration of AI in STEM Education: A Systematic Review. 327-335 - Saliha Ejaz, Farooque Azam, Muhammad Waseem Anwar, Marwareed Rehman:
Application of Artificial Intelligence for Assessing Models Consistency in Model-Driven Engineering. 336-340 - Puvana Venkidasalam, Amna Hatem Alshawa, Tek Yong Lim, Zhiqiang Luo:
Interaction Design in AI Applications: A Systematic Review. 341-347 - Kyoji Tanaka, Kenji Hisazumi:
Automated Scenario Generation for Autonomous Robots using Large Language Model. 348-352 - Manuel Fuchs, Stefan Machmeier, Sven Zelch, Vincent Heuveline:
A Reproducible VPN Benchmarking Framework for Comparison Across Implementations. 353-359 - Kamran Awan, Abdullah Alqahtani:
Adaptive Context-Aware Hierarchical Resource Management Algorithm for. 360-366

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.