


default search action
14th ICSCA 2025: Kuala Lumpur, Malaysia
- Proceedings of the 14th International Conference on Software and Computer Applications, ICSCA 2025, Kuala Lumpur, Malaysia, February 20-23, 2025. ACM 2025, ISBN 979-8-4007-1012-4
Chapter 1 Data Model Design And Algorithm Optimization
- Fazrul Ridha Alliandre
, Erna Hikmawati
:
Enhancing Panic Attack Predictions: Addressing Data Imbalance in Machine Learning Models. 1-5 - Ihfan Aditya Ghafur
, Lukman Abdurrahman
, Seno Adi Putra
:
Utilization of Process Mining to Analyze and Identify Improvement Opportunities in the New Student Admission Process. 6-12 - Pannag Kumaar
, Himank Bansal
, Maryam Khan
, Tania Somanna N
, Sarasvathi V
:
Breaking the Trackers: A Multi-Module Privacy Framework through Fingerprint Injection and Data isolation. 13-19 - Yee Jian Chew
, Shih Yin Ooi
, Ying-Han Pang
:
Forest Fire Inventory Dataset for Peninsular Malaysia (2001-2023) Generated Using a Framework with Google Earth Engine and Multi-Source Remote Sensing Data. 20-26 - Suyog K
, Sushmitha T
, Swathi
, Uttam Ballal
, Prema Ramasay
:
Stock Portfolio risk analysis using multimodal data. 27-32
Chapter 2 Data-based Intelligent Computing and Information Management
- Raed Shatnawi Shatnawi
:
Prioritizing Bugs using Stack Overflow Posts. 33-39 - Daniel Vietz
, Johanna Barzen
, Martin Beisel
, Frank Leymann
, Lavinia Stiliadou
, Benjamin Weder
:
Harnessing Patterns to Support the Development of Hybrid Quantum Applications. 40-46 - Tingting Huang
, Akinori Yokota
, Ken-ichi Suzuki
:
An Empirical Study of Risk Management Approaches in Information Systems Development Projects from the Vendor's Perspective: Evidence from Japan. 47-54 - Kengo Matsui
, Shigeki Hagihara
:
Design and Implementation of a Compact Educational Blockchain System to Aid Understanding of System Integrity and Behavior. 55-59
Chapter 3 Data-oriented Information System Optimization and Security Certification
- Noriyoshi Ozawa
, Satoru Sunahara
, Shigeki Hagihara
:
Evaluation Criteria for Explainable AI in Intrusion Detection to Ensure the Creation of High-Quality Threat Intelligence. 60-66 - Karthik Nallapula
, Sai Rahul Reddy Kona
, Akshay Vutti
, Hansika Pagadala
, Gauri Sameer Rapate
:
Road Incident Detection System. 67-71 - S. M. Zia Ur Rashid
, Mohammad Makchudul Alam
, Irfanul Montasir
, Ashfaqul Haq
:
Risk-Based MITRE TTP Scoring for Proactive Cyber Threat Prioritization and Response. 72-76 - Glicerio A Baguia
, Chris Jordan Aliac
, Larmie S. Feliscuzo
, Cherry Lyn Cando Sta. Romana
:
Integrating Cryptocurrency and Fiat Payments for a Serverless Water Billing System on Hyperledger Fabric Serverless Water Billing System on Hyperledger Fabric. 77-83
Chapter 4 Software Design, Testing and Security Verification
- Sarmad Soomro
, Ahsanullah Abro
:
Designing Layout-Agnostic Stencils to Minimize Visual Distraction in In-Vehicle Touchscreens. 84-89 - Sandro Hartenstein
:
Bridging the Security Gap: An Empirical Analysis of LLM-API Integration Vulnerabilities and Mitigation Strategies. 90-95 - Hussein Ali Al Hashimi
:
An Empirical Exploration of Cybersecurity Threats and Mitigation Strategies in Software Testing. 96-106 - Masaki Saito
, Akira Sasaki
, Hiroshi Hosobe
:
Case Studies Toward Introducing Liveness on Interactive System Development with p5.js. 107-114 - Oualid Miloudi
, Elmoukhtar Zemmouri
:
OpenMIP: Towards an Open Toolkit for Medical Image Processing. 115-119 - Roslina Mohd Sidek
, Kamal Z. Zamli
, Rozlina Mohamed
:
Multi-Task Test Redundancy Reduction Optimization Problem based on the Brown Bear Algorithm. 120-125 - Sarmad Soomro
, Ahsanullah Abro
:
Beyond One-Size-Fits-All: An Experimental Study on Evaluating Layout-Agnostic Tactile Stencils for In-Vehicle Touchscreen Interaction. 126-131
Chapter 5 Computational Models and Methods in Advanced Information Systems
- Haider Ali
, Zartasha Mustansar
:
Biomechanics of Lumber Spine using Microstructurally Realistic 3D Finite Element Modeling. 132-136 - Ayesha Inam Tarar
, Zartasha Mustansar
, Hafiz M. Yasir Bhatti
, Khujasta Khalid
, Waqar Ahmad Malik
, Mohaira Ahmad
:
Design and Development of non-invasive RF-Based Prototype for Bone Health Evaluation. 137-141 - Ayesha Jan
, Zartasha Mustansar
, Syed Irtiza Ali Shah
:
Innovative Modeling Approach to Investigate Joint Loading in Astronaut Biomechanics. 142-147 - MD Tasadul Islam Hemal
, Yew Keong Sin
, Ahmad Farimin Ahmad Osman
, Yi-Fei Tan
:
Prediction of Standard Minute Value Using Machine Learning in the Garment Industry. 148-153 - Ghifari Munawar
, Nur Ulfa Maulidevi
, Kridanto Surendro
:
Proposed Feature Dimensionality Reduction Method in a Predictive Model for Carbon Neutrality: A Hybrid Quantum-Classical Approach. 154-160 - Chang Liu
, Xingli Zhang
, Jiannong Shi
:
Multilevel Structural Equation Model Analysis Using Mplus : The Cross-level Role of Creative Classroom Environment in Children's Creativity Education. 161-171
Chapter 6 Image Recognition and Classification
- Masayuki Okabe
:
Time Series Classification with Composite Shapelets. 172-176 - Keysed Ian Vargas Mahor
, Meo Vincent Comia Caya
, Jocelyn Flores Villaverde:
Development of Natural Fiber Classification System using Deep Convolutional Neural Network. 177-182 - Raymart Oquingan Villena
, Jocelyn Flores Villaverde
:
Classification of Black Garlic Grade Using Convolutional Neural Network. 183-190 - Yan Zhang
, Jiacheng Li
, Masato Noto
:
Application of a Hybrid CNN-SE-GCN Model with Multi-Loss Optimization and Adversarial Samples in Real-Time Emotion Recognition. 191-197 - Siew-Chin Chong
, Lee-Ying Chong
, Kuok-Kwee Wee
:
Enhancing Masked Face Recognition with Real-Time Eye Blink Detection for Secure Access Control. 198-203
Chapter 7 Vision-based Digital Image Analysis and Processing Technology
- Otmane Azeroual
, Renaud Fabre
, Radka Nacheva
:
Modeling and Visualizing Human Experience in a Knowledge Graph: Understanding and Predicting Emotional Reactions to Life Events. 204-213 - Joseph Benedict Bacanto Espiritu
, Edrick Rabina Madlangbayan
, Jocelyn Flores Villaverde
:
Copra Dryness Assessment using ResNet50. 214-220 - Danendra Satriyo Buwono
, Erna Hikmawati
:
Enhancing Lung Cancer Diagnosis Prediction: A Feature Selection Approach to Improve Model Performance. 221-226 - Sai Charan Papineni
, Oshin Saraf
, Karun Vr
, Sai Krishna Muralidharan
:
Beyond The Bat: A Novel Video-Based Framework For Cricket Technique Emulation Through Image Processing. 227-231
Chapter 8 Intelligent Image Detection and Analysis Methods
- Pearl Joy Bernardo Rima
, Jocelyn Flores Villaverde
:
Detection and Identification of Abaca Plant Pests and Diseases using Computer Vision and Deep Neural Network. 232-237 - Masashi Katsumata
:
Learner Face Detection and Analysis in Smart Learning Environments. 238-241 - Nishita N. Joshi
, Keertiraj Krishna Vernekar
, Shriya Barad
, Shruthi Venkatraman
, Shruthi M. L. J
:
Performance Analysis of ML Models: An Overlook through the Perspective of VOCs to Detect Lung and Liver Cancer. 242-247 - Zhipeng Yu
, Haonan Qin
, Han Jiang
, Pengfei Zhang
:
Self-Attention-Enhanced Framework for Multi-Label Fundus Disease Detection in Imbalanced Datasets. 248-253
Chapter 9 Machine Learning Models and Intelligent Computing
- Rigel Rafiq Setiawan
, Erna Hikmawati
:
Enhancing Machine Learning Accuracy in Water Quality Assessment and Potability Prediction Using Imputation and Balancing Techniques. 254-259 - Lim Yong Sheng
, Musa Mohd Mokji
:
Proposing New Criteria for Early Stopping in CNN Training: A Step Towards Optimal Training. 260-266 - Wahyu Hidayat
, Nur Ulfa Maulidevi
, Kridanto Surendro
:
Designing a Quantum Annealing-Based Method for Optimizing Backpropagation Neural Networks in Greenhouse Gas Emissions Prediction. 267-272 - Luthfi Revansyah Pratama
, Erna Hikmawati
:
Enhancing Predictive Accuracy in Agricultural Land Suitability with Machine Learning Using Feature Selection and Data Balancing. 273-278 - Abdallah Qusef
, Hatem Mosa
, Ammar El-Hassan
:
Improving Fake News Detection in Arabic Using ML and DL Algorithms. 279-283 - Muhammad Haikel Nur Kamil Putra Mulyana
, Erna Hikmawati
, Rizza Indah Mega Mandasari
:
Enhancing Global Air Quality Classification Using Efficient Machine Learning Techniques. 284-289 - Ge-Zhi Zhao
, Yi-Fei Tan
, Hezerul Abdul Karim
, Tze-Hang Cheeng
, Ching-King Chia
:
Leveraging Machine Learning Techniques to Obtain Data for Virtual Sensors. 290-294 - Rafi Bagus Prayoga
, Erna Hikmawati
, Rizza Indah Mega Mandasari
:
Improving Predictive Accuracy of Sales and Satisfaction Analysis Using Mean Imputation and Machine Learning Models. 295-300 - Vitaliy Mezhuyev
, Sabine Hanusch
, Paul Hofmann
, Manfred Mücke
:
ML Model for Predicting Tensile Strength of 3D-Printed Components Using Bayesian Optimization. 301-306
Chapter 10 Artificial Intelligence Theory and Application
- Dina Oralbekova
, Orken Mamyrbayev
, Ainur Akhmediyarova
, Dinara Kassymova
, Alibiyeva Zhibek
:
Using Kazakh NER Datasets for Multiclass Classification in the Legal Domain: a Comparative Study of Bert, GPT, and LSTM Models. 307-312 - Zan-Kai Chong
, Hiroyuki Ohsaki
, Bryan Ng
:
LLM-Net: Democratizing LLMs-as-a-Service through Blockchain-based Expert Networks. 313-320 - Karthik Namboori
, Rohit P. Suresh
, Sathwik Hj
, Shriansh Mohanty
, Jayashree Rangareddy
:
Distributed Inference of Large Language Models on Edge Devices. 321-326 - Anh Hong Nguyen
, Duc Minh Nguyen
, Anh Duc Do
, Lan Thi Ha Nguyen
, Minh Hong Pham
, Anh Thi Minh Do
, Ban Quy Tran
:
Integration of AI in STEM Education: A Systematic Review. 327-335 - Saliha Ejaz
, Farooque Azam
, Muhammad Waseem Anwar
, Marwareed Rehman
:
Application of Artificial Intelligence for Assessing Models Consistency in Model-Driven Engineering. 336-340 - Puvana Venkidasalam
, Amna Hatem Alshawa
, Tek Yong Lim
, Zhiqiang Luo
:
Interaction Design in AI Applications: A Systematic Review. 341-347 - Kyoji Tanaka
, Kenji Hisazumi
:
Automated Scenario Generation for Autonomous Robots using Large Language Model. 348-352 - Manuel Fuchs
, Stefan Machmeier
, Sven Zelch
, Vincent Heuveline
:
A Reproducible VPN Benchmarking Framework for Comparison Across Implementations. 353-359 - Kamran Awan
, Abdullah Alqahtani
:
Adaptive Context-Aware Hierarchical Resource Management Algorithm for. 360-366

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.