CINXE.COM

2nd International Conference on Computer Science, Information Technology & AI (CSITAI 2024)

<!Doctype html> <html lang="en"> <head> <meta charset="UTF-8"> <meta http-equiv="X-UA-Compatible" content="id=edge"> <title>2nd International Conference on Computer Science, Information Technology & AI (CSITAI 2024)</title> <link rel="icon" type="image/png" sizes="96x96" href="images/logo.png"> <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css"> <link rel="stylesheet" href="bootstrap.css"> <link rel="stylesheet" href="style.css"> </head> <body id="home"> <nav class="navbar navbar-expand-md bg-dark navbar-primary fixed-top"> <div class="container"> <button class="navbar-toggler" data-toggle="collapse" data-target="#navbarCollapse"><span class="navbar-toggler-icon"></span>Menu</button> <a class="navbar-brand"><img src="images/logo.png" width="100px" height="40px" type="image/png" alt="brand-logo"></a> <div class="collapse navbar-collapse" id="navbarCollapse"> <ul class="navbar-nav ml-auto"> <li class="nav-item"> <a href="index" class="nav-link">Home</a> </li> <li class="nav-item"> <a href="papersubmission" class="nav-link">Paper Submission</a> </li> <li class="nav-item"> <a href="committee" class="nav-link">Program Committee</a> </li> <li class="nav-item"> <a href="papers" class="nav-link active">Accepted Papers</a> </li> <li class="nav-item"> <a href="contact" class="nav-link">Contact Us</a> </li> <li class="nav-item"> <a href="venue" class="nav-link">Venue</a> </li> </ul> </div> </div> </nav> <!-- Home Page /--> <header id="home-section"> <div class="dark-overlay"> <div class="home-inner"> <div class="container"> <div class="row"> <div class="col-xs-12 col-sm-10 col-md-10 col-lg-8 d-block bg-primary"> <h1 class="text-light p-2">2<sup>nd</sup> International Conference on Computer Science, Information Technology & AI (CSITAI 2024)</h1> <h4 align="center">December 28 ~ 29, 2024, Dubai, UAE</h4> </div> </div> </div> </div> </div> </header> <!-- Scope section /--> <!-- Scope & Topic Section /--> <section id="scope-section" class="bg-light text-dark py-5"> <div class="container"> <div class="row"> <div class="col-md8 text-justify"> <h3 class="text-secondary2 text-center display4">Accepted Papers</h3><br> <!---start csitai---> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Sentiment Analysis Using Various Machine Learning Models and Techniques</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Mohammad Mozammal Huq, Statistics Department, Jahangirnagar University, Bangladesh </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">The usefulness of several machine learning models and strategies for sentiment analysis is examined in this research study. The gathered data and analysis offer insightful knowledge into the subject of sentiment analysis and its application to a significant number of unlabeled customer reviews and comments on Amazon products. To categorize the sentiment of the reviews, the paper suggests a supervised research model that includes two different feature extractors. Along with a thorough overview of pertinent literature on sentiment analysis utilizing text-based datasets, the core theory of the model, analysis techniques, and performance standards are all the experiments conducted on a small dataset yielded promising results, with an accuracy of over 82 percent achieved by the random forest model. The comparison of different data quantities using cross-validation, varied training-testing ratios, and various feature extraction methods contributed to the robustness of the findings. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Sentiment Analysis, Machine Learning, Text Classification, NLP. </p> <br> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>A Hybrid Recommender System Integrating Collaborative Filtering, Content-based Filtering, and Deep Learning Techniques for Cold Start Scenarios</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Yashodeep Basnet. University of Northampton , UON, Kathmandu, Nepal </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">Recommender systems are pivotal in enhancing user experiences across digital platforms by providing personalized content. However, the "cold-start" problem, where systems struggle to generate meaningful recommendations for new users or items due to limited historical data, remains a significant challenge. This paper presents a novel hybrid recommender system that integrates collaborative filtering, content-based filtering, and deep learning techniques to address cold-start scenarios effectively. Utilizing the MovieLens 100K dataset, the proposed system leverages the strengths of each methodology to improve recommendation accuracy and robustness. Experimental results demonstrate that the hybrid model outperforms traditional methods, achieving lower error rates and higher precision, recall, and F1-scores, thereby validating its efficacy in handling data sparsity and enhancing user satisfaction. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Recommender systems, collaborative filtering, content-based filtering, deep learning, cold-start problem </p> <br> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Exploring High-accuracy Lung Cancer Risk Prediction: a Multi-model Approach with Shap Interpretation</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Haseebullah Jumakhan and Lana Weiss, Artificial Intelligence Research Center (AIRC), Ajman University, Ajman, United Arab Emirates </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">Abstract. Lung cancer remains a leading cause of cancer-related deaths worldwide. This study employs data mining techniques to analyze and predict lung cancer risk based on various patient attributes. Using a dataset of 1000 patients, we explore the relationships between factors such as air pollution exposure, smoking habits, and genetic risk with the likelihood of developing lung cancer. We implement and compare four machine learning models: Multinomial Logistic Regression, Random Forest, Naive Bayes, and a Neural Network. Our findings demonstrate the potential of these models in predicting lung cancer risk, with the Random Forest and Multinomial Logistic Regression models showing particularly high accuracy. This research contributes to the growing body of work on early lung cancer detection and risk assessment, potentially aiding in more timely and effective interventions. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Lung Cancer Risk Prediction, Machine Learning, Data Mining, Model Comparison, SHAP Analysis. </p> <br> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Predicting Student Grades</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Hifsa Malik and Ruba Qasim, Artificial Intelligence Research Center (AIRC), College of Engineering and Information Technology, Ajman University, Ajman P.O. Box 346, United Arab Emirates </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">This report represents our project of using machine learning models to forecast the performance of students. The dataset used comprises a wide range of academic, social, and demographic factors of secondary school students in Portugal, largely with regard to their Mathematics performance. Fortunately, we have data models that can be used to analyse and predict student performance. Firstly, the dataset is pre-processed through various data cleaning techniques followed by regression-based models among which are Linear Regression, Random Forest, Gradient Boosting, Support Vector Regressor, and XGBoost for grade prediction. This model will allow schools to have a predictive view of students’ performance at the beginning every year, to set an improvement plan for students. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Linear regression, random forest, feature selection, preprocessing, visualization, modelling, cross validation, outliers, standardization, SMOTE, feature importance, gradient boosting, SVR, XGboost, MAE, MSE,R2. </p> <br> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Multi-view Approach with Transformer Models and Augmented Embeddings for Tackling Imbalanced Multi-label Datasets. </b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Michael Abobor and Darsana P. Josyula, Department of Computer Science, Bowie State University, Bowie, USA </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">Imbalanced datasets present significant challenges in machine learning. The disproportionate distribution of labels in imbalanced multi-label datasets is a result of the low datapoints of the minority class. This leads to biases in model predictions as algorithms tend to favor the majority class, resulting in poor generalization for the minority class. Any effort to balance the inequality within each class can inadvertently create issues across the other classes. This paper introduces the multi-view learning approach that combines pre- trained large language models and embeddings augmented with techniques such as SMOTE, MLeNN, MLSMOTE, MLSOL, and MLTL. This helps address the issue of imbalanced multi-label datasets in classification. This dual input model combines the original tokenized text, and the augmented embeddings extracted from the penultimate layer of the transformer, giving the model the ability to learn from both sources of information. This approach conserves the contextual significance of the input text and makes it possible for training transformers with the augmented embeddings thereby tackling the issue of imbalance multi-class datasets. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Imbalanced datasets, Multi-label, Transformer, Augmented Embeddings, Machine Learning. </p> <br> <!---end csitai---> <!---start itcau---> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Computer Networks Cybersecurity Monitoring based on CNN-LSTM Model</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Rasim Alguliyev and Ramiz Shikhaliyev, Ministry of Science and Education Republic of Azerbaijan, Institute of Information Technology, Baku, Azerbaijan </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">Cybersecurity monitoring is essential for safeguarding computer networks. However, the increasing scale, complexity, and data volume of modern networks present significant challenges for traditional monitoring methods. To address these challenges, we propose a deep learning-based method for network security monitoring. Our method integrates convolutional neural networks (CNNs) with long short-term memory (LSTM) models. Trained on the CICIDS2017 dataset, the proposed model achieved a classification accuracy of 96.76% and an error rate of 9.34%, showcasing its effectiveness in managing complex and voluminous network data. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Computer Networks, Computer Network Cybersecurity Monitoring, Deep Learning Model, CNN-LSTM Model, Network Traffic Classification </p> <br> <!-- end of itcau--> <!---start iteory---> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Getting LLM to Think and Act Like a Human Being: Logical Path Reasoning and Replanning</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Lin Zhang, Qing Li, Yang Wang, and Jingmei Zhao, Southwestern University of Finance and Economics Chengdu, Sichuan , China </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">Large Language Models (LLMs) have significant reasoning capabilities and can act as agents interacting with the real world. However, they are often segmented and, unlike humans, lack integrated systems for validating their thoughts and actions. This limitation often leads LLMs to encounter “local optima” in task performance. To mitigate this problem, we propose a replanning mechanism for LLM-based agents that dynamically incorporates feedback from actions and exploits implicit information not initially available in the reasoning framework. This approach effectively bridges the gap between the cognitive and action phases of LLMs. Experimental results on real world ticket booking platforms such as Ctrip.com and Booking.com show that our method exhibits greater robustness in following clear instructions, successfully completing more steps, and achieving a higher success rate in practical applications, especially in complex tasks requiring interactive reasoning and action. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">LLM, Agents, Replanning, Reaction, Logical path reasoning. </p> <br> <!---end iteory---> <!---start energy---> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Feasibility of Energy Recovery From Exhausted Air of Hvac Systems </b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Anwur Alenezi<sup>1</sup>, Abouelyazed Kuliab<sup>2</sup> and Yousef Alabaiadly<sup>3</sup>, <sup>1</sup>Water Research Centre, Kuwait Institute for Scientific Research, Safat 13109, Kuwait, <sup>2</sup>New & Renewable Energy Authority, Ministry of Electricity & Renewable Energy, Egypt, <sup>3</sup>Studies and Research Department, Ministry of Electricity and Water, Ministries Zone 12010, Kuwait </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">This paper investigates the feasibility of recovering energy from exhaust air of air conditioning central plants experimentally. A mini vertical axis small wind turbine is connected directly with the exhaust air of condenser fan. The exhaust air energy recovery unit includes an air rotor-blades with generator. The electricity produced from the recovery unit is based on the value of fan speed and its air flow rate, CFM. The exhaust air from different central types of A/C systems is measured experimentally. As example, the speed of air exhausted in a central package unit with capacity of 5 ton refrigeration (TR) is reached to 8-15 m/s. The wind speed levels play significant effect on the performance of wind turbine. a small vertical wind turbine was installed on the exhaust of air flowing from the condenser fan of central package 10-ton refrigeration (TR). The proposed exhaust air energy recovery unit is produced to 35-40% of the total energy consumption in a building having an A/C plant. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Energy recovery, wind turbine, exhaust air, HVAC systems. </p> <br> <!---end energy---> <!---start coraj---> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>A Survey Paper Exploring It Outsourcing Models and Market Trends</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Merita Bakiji, Faculty of Contemporary Sciences and Technologies , South East European University , Tetovo, North Macedonia </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">As a result of the great boom experienced by global business, rapid technological developments, IT Outsourcing came as a result of organizations attempts to reduce operational costs and increase efficiency through external expertise.Through this study, it is intended to explore the current models of IT Outsourcing, detailing their sustainability and suitability in different market environments.This goal is attempted to be achieved by relying on a comprehensive summary of existing literature, articles and existing studies on IT Outsourcing, industry reports, consultancy reports, technological trends and their impacts on the market.The study also analyzes the IT Outsourcing industry map in the Republic of North Macedonia revealing the IT Outsourcing market and trends.By synthesizing existing research and data, this paper presents a valuable resource for decision makers in IT outsourcing, by providing practical recommendations that can serve organizations that are constantly trying to adapt to with rapidly changing market conditions. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">IT Outsourcing, Artificial Intelligence, Market Trends, North Macedonia. </p> <br> <!--- Ends coraj----> <!---start comsap---> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Machine Learning Classification Using Motif Based Graph Databased Created From Uwf-zeekdata22</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">Sikha S. Bagui<sup>1</sup>, Dustin Mink<sup>2</sup>, Subhash C. Bagui<sup>3</sup>, Jadarius Hill<sup>1</sup>, Farooq Mahmud<sup>1</sup> and Michael Plain1<sup>3</sup>, <sup>1</sup>Department of Computer Science, University of West Florida, Pensacola, Florida, USA, <sup>2</sup>Department of Cybersecurity, University of West Florida, Pensacola, Florida, USA, <sup>3</sup>Department of Mathematics and Statistics, University of West Florida, Pensacola, Florida, USA </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">This study uses motif-based graph databases to classify tactics in the MITRE ATT&CK framework. Machine Learning classification models capable of detecting Reconnaissance network attack tactics, labelled as per the MITRE ATT&CK framework, are created for the newly created UWF-ZeekData22 dataset. The work analyzes Zeek Connection logs. Feature selection is performed using graph motifs. Results show that model performance can be increased using various network graph motifs. Upon completion of this work, it was concluded that the most important feature for predicting Reconnaissance network attacks within the Zeek Connection Logs dataset was the “From” feature, which represents the network address from where the connection is originating. It was also determined that, irrespective of which motif was used to train the model, the Decision Tree algorithm performed best. </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Graph Databases, Motifs, Reconnaissance, Machine Learning, Cybersecurity. </p> <br> <!--- Ends comsap----> <!---start istech---> <h6 style="color:black;font-family:classic wide,sans-cserif;font-size:20px"><b>Reliable Information Sources Consulted by Nurses at the Point of Care in Four Selected South African Referral Hospitals</b></h6> <p style="color:black;text-align:justify;font-size: 15px;">N Chitha, O R Mnyaka; J T Thabethe, N Ntsele, S Nomatshila; W Chitha, NV Khosa, and R Tshabalala, Department of Public Health, Faculty of Medicine and Health Science, University of Walter Sisulu, Mthatha, South Africa </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>ABSTRACT</b></h6> <p style="color:black;text-align:justify;">Information is crucial tool for nurses, and how they acquire and use it is key to their performance. Professional nurses need information that is accessible, good quality, up-to- date, manageable, and relevant, as well as information services that assist in finding that information. This study assessed the most reliable information sources nurses use to make clinical decisions at the point of care. A quantitative cross-sectional survey was conducted in four referral hospitals across four South African provinces, Mpumalanga, Limpopo, Eastern, and Northern Cape, between May and July 2022. The hospitals were identified using simple random sampling. Stratified random sampling was utilised to select nurses within the hospitals. Data were entered into Microsoft Excel and analysed using STATA version 17 and SPSS version 26. Nurses mostly relied on nursing colleagues (86.8%, 362/417) or doctors (78.4%, 309/394) for information whilst they sometimes consulted protocols or guidelines (63.5%, 247/389). </p> <h6 style="color:black;font-family:classic wide,sans-serif;"><b>Keywords</b></h6> <p style="color:black;text-align:justify;">Reliable Information, Information Sources, Nurses Information, Health Information. </p> <br> <!--- Ends istech----> </div> </div> </div> </section> <!-- Footer Section /--> <section id="footer-section" class="bg-dark text-light py-3 text-center"> <div class=""> <div class="container"> <div class="row"> <div class="card-body col-sm-6 col-md-4"> <h6>Contact Us</h6> <p><a href="mailto:csitai@csitai2024.org" class="text-white">csitai@csitai2024.org</a></p> </div> <div class="card-body col-sm-6 col-md-4 text-center"> <br> </div> <div class="card-body col-xs-6 col-sm-6 col-md-4 col-lg-3 col-xl-2 text-center"> <h6 class="header-h6">Follow Us</h6> <div> <a href="https://www.facebook.com/AIRCCPC" target="blank" class="fa fa-facebook" aria-hidden="true"></a> <a href="https://twitter.com/AIRCCFP" target="blank" class="fa fa-twitter" aria-hidden="true"></a> <a href="https://www.youtube.com/channel/UCzkuYvuKuNCIc3jbE52IeZg" target="blank" class="fa fa-youtube-play" aria-hidden="true"></a> </div> </div> </div> </div> </div> </section> <section class="copyright bg-dark text-light text-center py-3"> <div class="container-fluid"> <p>Copyright &copy; CSITAI 2024</p> </div> </section> <script src="jquery.min.js"></script> <script src="popper.min.js"></script> <script src="bootstrap.min.js"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10