Full Description
This book constitutes the proceedings of the International conference on AI Revolution: Research, Ethics and Society, AIR-RES 2025, held in Las Vegas, Navada, USA, during April 14-16, 2025.
The AIR-RES Conference received 620 submissions, of which 131 papers were accepted, resulting in a paper acceptance rate of 21%.
Contents
.- ARTIFICIAL INTELLIGENCE & DATA SCIENCE.
.- Data Cube for Exploring Anomalies in Justice Delivery: An Experiment on Indian Judgements.
.- Intelligent Data Approximation for Reducing Write Energy in Multi-Level Cell PCM.
.- Maximizing ROI in Supply Chain Forecasting: A Data-Driven Deep Learning Approach for Enhanced Accuracy and Efficiency.
.- Assessing the Efficacy of DinoV2-Based Embeddings in Clustering Visual Data from C2C Marketplaces.
.- Industrial Safety Compliance using Custom Open-Source Dataset and YOLOv11.
.- Traceable and Revokable Attributes-Based Verifiable Searchable Authentication Scheme for Blockchain Data Sharing.
.- Application of Deep Learning Model for Enhancing Medical Image Classification using Non-local Means Filtering, Contrast-limited Adaptive Histogram Equalization and Data Augmentation.
.- Development of Learning Data Dictionary for Artificial Intelligence Digital Textbooks.
.- A Family-based Online Database System.
.- AI Leveraging Data Modeling for Efficient Travel Management.
.- ARTIFICIAL INTELLIGENCE: SECURITY METHODOLOGIES AND RELATED ISSUES.
.- New Proposal for Homomorphic AI.
.- Maha: Security Protocols on Fog Network.
.- A Dynamic Hybrid IDS for APT Detection in SCADA using Deep Neural Networks.
.- Comparative Performance Analysis of Machine Learning Algorithms for Fraudulent Credit Card Transaction Detection.
.- A Multi-Layer Perceptron Approach for Detecting Network-Layer Attacks in IoT Networks.
.- Mitigating Rapid Reset DDoS Attacks in the Financial Sector: A Cybersecurity Framework.
.- Intelligent Intrusion Detection in Industrial Control Systems: A Comprehensive Evaluation of Machine Learning and Deep Learning Approaches.
.- Ransomware and AI Defense Mechanisms.
.- AI-Driven Analysis of Cybersecurity Threats and Defense Mechanisms in 5G Networks.
.- MShield LSTM Model for Detecting Insider Threat Attacks in Critical Infrastructure Using Machine Learning.
.- Defense Against Adversarial Attack on Medical Imaging.
.- Analytical Study for DDoS Detection Algorithms in Cloud Computing.
.- ARTIFICIAL INTELLIGENCE: COMPUTER VISION AND APPLICATIONS.
.- A Semi-Automatic Approach for Minimizing Expert Annotations in Medical Image Segmentation.
.- Semantic Representation of Musical Identity: AI-Driven Cover Image Generation from Lyrics.
.- Modular Framework for Cluster Analysis in Surveillance Cameras.
.- BFS-Based Weighted Late Fusion for 3D Object Detection in V2X Systems.
.- Comparative Study of Single-Stage vs. Two-Stage Detectors for ASL Gesture Recognition.
.- Virtual Crop Development and Automated Weed Detection for Precision Agriculture.
.- Video Compression Artifacts Reduction with Recurrent Video Restoration Transformer.
.- Preferential Ensemble Method with Exponentially Tunable Hyperparameter for Skin Cancer Diagnosis.
.- ARTIFICIAL INTELLIGENCE: THEORIES, METHODOLOGIES, AND APPLICATIONS.
.- Evaluating Automatic Speech Recognition Models: How Well Do They Handle Accents?.
.- On Specification for an Academic Ontology.
.- Uncovering Mental Health Disparities through Social Determinants.
.- Comparing Impacts of Artificial Intelligence on Employment in Financial Industry and Manufacturing Industry.
.- Investment Decision-Making in the AI Era.
.- Parameter Estimation for Complex Systems Using Systems Dynamics Aware Neural Networks.
.- 2AIO: The Application of Artificial Intelligence in Osteoporosis.



