No abstract available.
Proceeding Downloads
Routie: An Application to Help Aid Commuters in the Philipines
- Charlene Grazielle E. Lara,
- Drizzle Joy V. Caberto,
- Roseville Jeanne L. Evangelista,
- Danielle Franchesca L. Mancilla,
- Katrina Francesca Soo,
- Elcid A. Serrano
In the Philippines, where commuting woes are pervasive, a prototype commuting application has been developed to simplify public transportation navigation. This study evaluated the application's user experience through a survey involving 50 participants. ...
Intrusion Detection based on extracting Optimization Features for Bidirectional Long-Short-Term-Memory
In today’s insecure digital landscape, the need for robust Intrusion Detection Systems (IDS) is more critical than ever. Network attacks and unauthorized intrusions pose significant threats, requiring effective IDS development. Many intrusion detection ...
Comparative Analysis and Application of Cybersecurity Framework to Philippine Small and Medium Enterprises (SMEs)
This paper compares the NIST and ISO cybersecurity frameworks and their application to Philippine Small and Medium Enterprises (SMEs). The study aims to empower SMEs with an understanding of cybersecurity frameworks and provide insights for risk ...
Modeling the Parallel Drone Scheduling Vehicle Routing Problem as a Heterogeneous Vehicle Routing Problem
Drones are currently seen as a viable way for improving the distribution of parcels in urban and rural environments, especially while working in coordination with traditional vehicles like trucks. In this paper, we consider the parallel drone scheduling ...
Performance Analysis of IoT Networks with UAV-assisted NOMA-based WPT-MEC
This paper investigates the performance of an Internet of Things (IoT) system utilizing a unmanned aerial vehicle (UAV) in an urban environment with the assistance of non-orthogonal multiple access (NOMA) based mobile-edge computing (MEC). We consider ...
Malware Detection on Windows Portable Executables with Long-Short Term Memory Trained on PCA Selected and TF-IDF Engineered Windows API Call Sequences
Existing applications of deep learning in detecting malware in Windows systems leverage static and dynamic analysis. Deep learning models that rely on static analysis look for patterns in signatures and opcode that can be found in existing, known malware ...
Credit Card Fraud detection with Attention Mechanism
This paper presents a novel credit card fraud detection approach using an attention-driven mechanism. The proposed method demonstrates outstanding experimental results compared to baseline approaches. Leveraging attention mechanisms, the model ...
Solving Portfolio Optimization Problem for Long-term Stocks Investment using Ant Colony Optimization
This paper investigates the application of data science techniques to address the critical challenge of retirement planning for Thai elders through long-term investment in SET50 stocks. With Thailand's rapidly aging population and rising healthcare costs,...
Fraud Detection Models and their Explanations for a Buy-Now-Pay-Later Application
Buy-now-pay-later (BNPL) has been increasingly adopted by young shoppers as well as older generations because applying for a BNPL service is hassle-free compared to credit card applications. However, preventing fraudulent transactions is indispensable. ...
Zk-Auction: A Cross-Blockchain System for Efficient Auctions combining Zero-Knowledge Proof and NFT
Although online auctions have gained popularity as a marketplace format, they encounter challenges stemming from bidders withdrawing high bids without penalty, and wasting organizer resources due to redundant auction rounds. This behavior, known as ...
Index Terms
- Proceedings of the 2024 9th International Conference on Intelligent Information Technology