{"id":621,"date":"2024-03-23T02:44:53","date_gmt":"2024-03-23T02:44:53","guid":{"rendered":"https:\/\/acmse.net\/2024\/?page_id=621"},"modified":"2024-04-28T20:36:36","modified_gmt":"2024-04-28T20:36:36","slug":"schedule-papers","status":"publish","type":"page","link":"https:\/\/acmse.net\/2024\/schedule-papers\/","title":{"rendered":"Schedule of Paper Presentations"},"content":{"rendered":"<div style=\"font-size: 20px;font-weight: bold;padding: 10px;margin-left: 0;margin-bottom: 18px;border-radius: 4px;color: white;background-image: linear-gradient(135deg, #000000, #000000, #000000, #000000, #000000, #000000, #fec52e, #000000, #000000)\">Schedule of Paper Presentations (Thursday 4\/18)<\/div>\n<p>&nbsp;<\/p>\n<table style=\"height: 100px;width: 100%\">\n<tbody>\n<tr>\n<td colspan=\"3\" width=\"708\"><strong>Detailed Program Schedule (Long paper denoted by an asterisk at the end of the title)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\"><strong>Room J-101<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\"><strong>Session I. Exploring Innovations and Challenges in Electric Mobility<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\"><strong>Chair by Mr. Md Romyull Islam<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\">9:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Blockchain-based Decentralized Application for Electric Vehicle Scheduling at Charging Station*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Riya Kakkar, Sachi Chaudhary, Rajesh Gupta, Sudeep Tanwar, Suman Kumar<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\">9:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">A Systematic Investigation of Hardware and Software in Electric Vehicular Platform*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Kun Suo, Long Vu, Md Romyull Islam, Nobel Dhar, Tu Nguyen, <\/span><span style=\"color: #0000ff\">Selena He, Xiaofeng Wu<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\">10:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Living on the Electric Vehicle and Cloud Era: A Study of Cyber Vulnerabilities, Potential Impacts, and Possible Strategies*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Long Vu, Kun Suo, Md Romyull Islam, Nobel Dhar, Tu Nguyen, Selena He, Yong Shi<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">10:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Coffee Break<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Room J-135<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Session II. Exploring Innovations in Operating Systems and Online Education<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\"><strong>Chair by Dr. Robert Lowe<\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\">Southeast Missouri State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">9:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">A Flexible and Broad Operating System Project*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Robert Lowe<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">9:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Effect of LMS Course Structure on Student Success in Asynchronous Online Course<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Cindy Robertson, Anca Doloc- Mihu<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">10:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Assessing Mini-Learning Communities in General Education Computing Classes*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Cindy Robertson, David Kerven<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">10:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Coffee Break<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #008000\"><strong>Room J-101<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #008000\"><strong>Session III. Advancing Privacy Protection through Encrypted Technologies<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Chair by Dr. Kazi Aminul Islam<\/strong><\/span><\/p>\n<p><span style=\"color: #008000\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">10:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Privacy-Preserving Mobile Advertising Using ElGamal Encryption and Private Proximity Testing<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Sanjaikanth E Vadakkethil Somanathan Pillai, Wen-Chen Hu<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">11:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Privacy-Preserving Gross Domestic Product (GDP) Calculation Using Paillier Encryption and Differential Privacy<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Sanjaikanth E Vadakkethil Somanathan Pillai, Wen-Chen Hu<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">11:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Lunch buffet preparation<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">12:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Lunch Time<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000\"><strong>Room J-135<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000\"><strong>Session IV. Innovative Approaches in Data Science Education and Software Development Platforms<\/strong><\/span><\/td>\n<td width=\"216\"><strong><span style=\"color: #ff0000\">Chair by Dr. Steven Benzel<\/span><\/strong><\/p>\n<p><span style=\"color: #ff0000\">University of North Georgia<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">10:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">SOTU: A Motivational Example for Data Science Courses<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\">Steven Benzel, Ana Stanescu, Ping Ye<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">11:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">Test Case Expression in a Low-Code Development Platform<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\">Ziliang Zhang, Jeff Gray<\/span><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\"><strong>Room I2-112<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><strong><span style=\"color: #ff0000;background-color: yellow\">12:45<\/span><\/strong><\/td>\n<td width=\"390\"><strong><span style=\"color: #ff0000;background-color: yellow\">Opening Ceremony<\/span><\/strong><\/td>\n<td width=\"216\"><strong><span style=\"color: #ff0000;background-color: yellow\">Dean Sumanth Yenduri<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><strong><span style=\"color: #ff0000;background-color: yellow\">13:00<\/span><\/strong><\/td>\n<td width=\"390\"><strong><span style=\"color: #ff0000;background-color: yellow\">Keynote I: Navigating the Quantum Frontier: Unleashing<br \/>\nInnovation in the Age of Quantum Computing and AI<\/span><\/strong><\/td>\n<td width=\"216\"><strong><span style=\"color: #ff0000;background-color: yellow\">Flavio Villanustre, CISSP<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Room I2-112<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Session V. Advancements in Deep Learning, Quantum Computing, and Historical Data Analysis<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\"><strong>Chair by Mr. Ethan Hunt<\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">14:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Optimum Deep Learning Method for Document Layout Analysis in Low Resource Languages<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Md. Mutasim Billah Abu Noman Akanda, Maruf Ahmed, AKM Shahariar Azad Rabby, Fuad <\/span><span style=\"color: #ff6600\">Rahman<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">14:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Phase RAM: Phase Estimation\u2019s Application in QRAM<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Ethan Hunt<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">15:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Challenges of Automatic Document Processing with Historical Data*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Katerina Vilkomir, Nic Herndon<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">15:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Coffee Break<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">SHORT PAPERS<\/span><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #008000\"><strong>Room I2-112<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #008000\"><strong>Session VI. Investigating Large Language Models: Performance, Deployment, and Resource Management<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Chair by Dr. Bobin Deng<\/strong><\/span><\/p>\n<p><span style=\"color: #008000\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">16:10<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Large Language Models Performance Comparison of Emotion and Sentiment Classification*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Will Stigall, Md Abdullah Al Hafiz Khan, Dinesh Attota, Francis <\/span><span style=\"color: #008000\">Nweke, Yong Pei<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>\u00a0<\/strong><\/span><span style=\"color: #008000\">16:40<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">An Empirical Analysis and Resource Footprint Study of Deploying Large Language Models on Edge Devices*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Nobel Dhar, Bobin Deng, Dan Lo, Xiaofeng Wu, Liang Zhao, Kun <\/span><span style=\"color: #008000\">Suo<\/span><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000\"><strong>Room J-101<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000\"><strong>Session VII. Innovations in Cybersecurity: From Phishing Detection to Genomic Security<\/strong><\/span><\/td>\n<td width=\"216\"><strong><span style=\"color: #ff0000\">Chair by Dr. Mario Guimaraes<\/span><\/strong><\/p>\n<p><span style=\"color: #ff0000\">Southeast Missouri State University <\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">14:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\">Sultan Asiri, Yang Xiao, Saleh Alzahrani<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">14:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\"><strong>\u00a0<\/strong><\/span><span style=\"color: #ff0000\">Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\">Jared Sheldon, Scott Ross, Thomas Morris, Isabelle Brown, <\/span><span style=\"color: #ff0000\">Feng Zhu, Patrick Pape, Phillip Whitlow<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">15:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">Enhancing Machine Learning Based SQL Injection Detection Using Contextualized Word Embedding <em>[Synchronous Online]<\/em><br \/>\n<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\">Janet Zulu, Bonian Han, Izzat Alsmadi, Gongbo Liang<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">15:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">Coffee Break<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\"><strong>Room J-135<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\"><strong>Session VIII. Enhancing Smart Grids and Electrical Systems: Insights and Innovations in AI and Multi-Agent Systems<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\"><strong>Chair by Dr. Bharath Reddy<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\">Schneider Electric Automation R&amp;D, Foxboro, Massachusetts<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\">14:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Building a Resilient and Sustainable Grid: A Study of Challenges and Opportunities in AI for Smart Virtual Power Plants*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Md Romyull Islam, Long Vu, Nobel Dhar, Bobin Deng, Kun Suo<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">14:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Enhancing Interpretability of Electrical Load Forecasting with Architecture Optimization<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Biju G. M., Gopinatha Pillai, Albin Jiji<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">15:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">A Multi-Agent System Approach for Mitigating Partial Display Failures*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Jacob Cappi, Jacob Hauenstein<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">15:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Coffee Break<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>April 18, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Room J-135<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Tutorial<\/strong><\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>\u00a0<\/strong><\/span><span style=\"color: #ff6600\">16:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Tutorial 1: Hallucination-Free Generative LLM for Learning Enrichment on Edu Data<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Shobhan Kumar, Pavan Kumar, <\/span><br \/>\n<span style=\"color: #ff6600\">and Masoud Rouhizadeh<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<div style=\"font-size: 20px;font-weight: bold;padding: 10px;margin-left: 0;margin-bottom: 18px;border-radius: 4px;color: white;background-image: linear-gradient(135deg, #000000, #000000, #000000, #000000, #000000, #000000, #fec52e, #000000, #000000)\">Schedule of Paper Presentations (Friday 4\/19)<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<table style=\"height: 100px;width: 100%\">\n<tbody>\n<tr>\n<td colspan=\"3\" width=\"708\"><strong>Detailed Program Schedule (Long paper denoted by an asterisk at the end of the title)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>April 19, <\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\"><strong>Room J-101<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>Session IX. Discovering Generative AI in Healthcare Information Systems: Promises and Challenges<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\"><strong>Chair by Dr. Suman Kumar<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\">Troy University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">9:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Impact of Blinking on Deep Learning-based Iris Recognition<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Daniel Tebor, Eli Headley, Mahmut Karakaya<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">9:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Comprehensive Experiments on Breast Cancer Hematoxylin and Eosin-stained Images using UNet<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Emily Jackson, Faye Le, Je&#8217;Dae Lisbon, Max Coleman, Jordyn Burman, Astrid Wonderley, Sepehr Eshaghian, Sanghoon <\/span><span style=\"color: #0000ff\">Lee<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">10:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Promise and Challenges of Generative AI in Healthcare Information Systems<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Stanislav Ustymenko, Abhishek Phadke<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">10:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Coffee Break<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>April 19, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Room J-101<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>Session X. Novel Approaches in Code Analysis and Secure Code Generation<\/strong><\/span><\/td>\n<td width=\"216\"><strong><span style=\"color: #ff6600\">Chair by Dr. Nic Herndon<\/span><\/strong><\/p>\n<p><span style=\"color: #ff6600\">East Carolina University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\">10:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Leveraging Eye Tracking and Targeted Regions of Interest for Analyzing Code Comprehension*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Md Shakil Hossain, Andrew Allen, Noushin Gauhar, Rushmila Shabneen<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">11:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">A Pilot Study on Secure Code Generation with ChatGPT for Web Applications<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Mahesh Jamdade, Yi Liu<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">11:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Lunch buffet preparation<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">12:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Lunch time<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000;background-color: yellow\">12:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000;background-color: yellow\"><strong>Keynote II: The IEEE Rebooting Computing Initiative: A Retrospective<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000;background-color: yellow\"><strong>Tom Conte<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>April 19, <\/strong><\/span><\/p>\n<p><span style=\"color: #008000\"><strong>Room J-101<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\"><strong>Session XI. Studying Container Resilience, ML Model Prediction, and Optimization Algorithms in IoT Environments<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Chair by Dr. Yong Shi<\/strong><\/span><\/p>\n<p><span style=\"color: #008000\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">14:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Image-Processing Workloads and DDoS Attack Resilience: Evaluating Docker and Podman Containers on Raspberry Pi <\/span><span style=\"color: #008000\">and ODROID*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Eric Gamess, Mausam Parajuli<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">14:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Prediction Performance Analysis for ML Models Based on Impacts of Data Imbalance and Bias<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Chunlan Gao, Yong Shi<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">15:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Exploring Firefly and Greywolf Algorithms for Multi-objective Optimization in Wireless Sensor Networks<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Kelvin Ovabor, Travis Atkison<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">15:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Coffee Break<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>April 19, <\/strong><\/span><\/p>\n<p><span style=\"color: #008000\"><strong>Room J-101<\/strong><\/span><\/td>\n<td width=\"390\"><strong><span style=\"color: #008000\">Workshop<\/span><\/strong><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">15:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">NSF Noyce K-12 CS Teacher Education Workshop<\/span><\/td>\n<td width=\"216\"><strong><span style=\"color: #008000\">Dan Lo and Brian Lawler<\/span><\/strong><\/p>\n<p><span style=\"color: #008000\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\"><strong>April 19, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000\"><strong>Room J-100<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">15:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">Poster (Accepted posters are listed below.)<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>April 19, <\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\"><strong>Room A-201<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">18:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Banquet<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>April 19, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Room J-135<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>Session XII. Improvements in Brain-Computer Interfaces, Hate Speech Detection, and Financial Risk Assessment<\/strong><\/span><\/td>\n<td width=\"216\"><strong><span style=\"color: #ff6600\">Chair by Dr. Nic Herndon<\/span><\/strong><\/p>\n<p><span style=\"color: #ff6600\">East Carolina University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">9:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>\u00a0<\/strong><\/span><span style=\"color: #ff6600\">Automated Alphabet Detection from Brain Waves<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Christopher Dargan, Francis Nweke, Md Abdullah Al Hafiz Khan, Abm Adnan Azmee, Yong Pei<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">9:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Evaluation of Different Machine Learning and Deep Learning Techniques for Hate Speech Detection<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Nabil Shawkat, Jamil Saquer, Hazim Shatnawi<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">10:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Benchmarking Machine Learning Techniques for Bankruptcy Prediction under Benign and Adversarial Behaviors<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Xing Yin, Thai Le<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">10:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Coffee Break<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>April 19, <\/strong><\/span><\/p>\n<p><span style=\"color: #008000\"><strong>Room J-135<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\"><strong>Session XIII. Developments in Educational Tools and Fairness-Accuracy Trade-Offs in Machine Learning<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Chair by Mr. Long Vu<\/strong><\/span><\/p>\n<p><span style=\"color: #008000\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">10:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">A Testing Extension for Scratch<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Herart Dominggus Nurue, Jeff Gray<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">11:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Exploring Fairness-Accuracy Trade-Offs in Binary Classification: A Comparative Analysis Using Modified Loss<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Christina Trotter, Yixin Chen<\/span><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\"><strong>April 19, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000\"><strong>Room J-135<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000\"><strong>Session XIV. Innovative Approaches in Data Representation and Linguistic Corpus Development<\/strong><\/span><\/td>\n<td width=\"216\"><strong><span style=\"color: #ff0000\">Chair by Mr. Kazi Fahim Ahmad <\/span><\/strong><br \/>\n<strong><span style=\"color: #ff0000\">Nasif<\/span><\/strong><\/p>\n<p><span style=\"color: #ff0000\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">14:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">Encoding Feature Models in Neo4j Graph Database*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\">Hazim Shatnawi, Jamil Saquer<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">14:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">PalmProbNet: A Probabilistic Approach to Understanding Palm Distributions in Ecuadorian Tropical Forest via Transfer Learning<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\">Kangning Cui, Zishan Shao, Gregory Larsen, Victor Pauca, Sarra Alqahtani, David Segurado, Jo\u00e3o Pinheiro, Manqi Wang, David Lutz, Robert Plemmons, Miles Silman<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">15:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">Toshakhana: A Multidimensional Panjabi Corpus in Gurmukhi Script<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\">Arvinder Kang, Thai Le, Yixin Chen<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">15:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">Coffee Break<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><strong><span style=\"color: #ff0000\">April 19, <\/span><\/strong><\/p>\n<p><strong><span style=\"color: #ff0000\">Room J-135<\/span><\/strong><\/td>\n<td width=\"390\"><strong><span style=\"color: #ff0000\">Tutorial <\/span><\/strong><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\">15:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\">Tutorial II: Advanced Topics in the First Database Class<\/span><\/td>\n<td width=\"216\"><strong><span style=\"color: #ff0000\">Mario Guimaraes and Suhair <\/span><\/strong><span style=\"color: #ff0000\"><strong>Amer<\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000\">Southeast Missouri State <\/span><span style=\"color: #ff0000\">University<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<div style=\"font-size: 20px;font-weight: bold;padding: 10px;margin-left: 0;margin-bottom: 18px;border-radius: 4px;color: white;background-image: linear-gradient(135deg, #000000, #000000, #000000, #000000, #000000, #000000, #fec52e, #000000, #000000)\">Schedule of Paper Presentations (Saturday 4\/20)<\/div>\n<p>&nbsp;<\/p>\n<table style=\"height: 100px;width: 100%\">\n<tbody>\n<tr>\n<td colspan=\"3\" width=\"708\"><strong>Detailed Program Schedule (Long paper denoted by an asterisk at the end of the title)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>April 20, <\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\"><strong>Room J-101<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\"><strong>Session XV. Discovering Provenance and Advancements in AI for Education and IoT<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\"><strong>Chair by Dr. Arthur Choi<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">9:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">MNIST-Fraction: Enhancing Math Education with AI-Driven Fraction Detection and Analysis<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Pegah Ahadian, Yunhe Feng, <\/span><span style=\"color: #0000ff\">Karl Kosko, Richard Ferdig, Qiang Guan<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">9:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Evaluation of Thermal Stress on IoT-based Federated Learning<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Yi Gu, Liang Zhao, Bobin Deng, Shaoen Wu<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">10:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Optimum Deep Learning Method for Document Layout Analysis in Low Resource Languages<\/span><\/td>\n<td width=\"216\"><span style=\"color: #0000ff\">Md. Mutasim Billah Abu Noman Akanda, Maruf Ahmed, AKM Shahariar Azad Rabby, Fuad Rahman<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #0000ff\">10:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #0000ff\">Coffee Break<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>April 20, <\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Room J-101<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\"><strong>Session XVI. Analyzing Performance in Sequence Alignment, Error Correction Strategies, and Topic Models<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\"><strong>Chair by Dr. Lizi Zhu <\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600\">Northeastern Illinois University, Chicago<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\"><strong>Time<\/strong><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\"><strong>Title<\/strong><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\"><strong>Authors<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">10:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Performance Analysis of Multiple Sequence Alignment Tools*<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Bharath Reddy, Richard Fields<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">11:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Open-Locating-Dominating Sets with Error Correction<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Devin Jean, Suk Seo<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">11:50<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">On Provenance in Topic Models<\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff6600\">Misha Sharma, Arthur Choi<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff6600\">12:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff6600\">Lunch on your own<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" width=\"708\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><strong>A<span style=\"color: #008000\">pril 20, <\/span><\/strong><\/p>\n<p><strong><span style=\"color: #008000\">Room J-135<\/span><\/strong><\/td>\n<td width=\"390\">&nbsp;<\/p>\n<p><strong><span style=\"color: #008000\">Ph.D. Symposium<\/span><\/strong><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Chair by Dr. Abhishek Parakh<\/strong><\/span><\/p>\n<p><span style=\"color: #008000\">Kennesaw State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">9:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Ph.D. Symposium: Maximizing Learning Outcomes: Autograding in Scratch Programming<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Herart Dominggus Nurue<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">9:30<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Ph.D. Symposium: Revolutionizing Healthcare with Quantum Molecular Dynamic Simulation of Entanglement vs. <\/span><span style=\"color: #008000\">Disentanglement in Medical Advancements<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\">Kiran Mai Narnavaram<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><strong><span style=\"color: #008000\">April 20,<\/span><\/strong><\/p>\n<p><strong><span style=\"color: #008000\">Room J-135<\/span><\/strong><\/td>\n<td width=\"390\"><strong><span style=\"color: #008000\">Tutorial<\/span><\/strong><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">10:00<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Tutorial III: Creating Cybersecurity Awareness for CEO\u2019s<\/span><\/td>\n<td width=\"216\"><span style=\"color: #008000\"><strong>Mario Garcia<\/strong><\/span><\/p>\n<p><span style=\"color: #008000\">Southeast\u00a0Missouri State University<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #008000\">12:20<\/span><\/td>\n<td width=\"390\"><span style=\"color: #008000\">Lunch on your own<\/span><\/td>\n<td width=\"216\"><\/td>\n<\/tr>\n<tr>\n<td width=\"102\"><span style=\"color: #ff0000\"><span style=\"background-color: yellow\">12:30<\/span><\/span><\/td>\n<td width=\"390\"><span style=\"color: #ff0000\"><span style=\"background-color: yellow\">City Tour<\/span><\/span><\/td>\n<td width=\"216\"><span style=\"color: #ff0000\"><span style=\"background-color: yellow\">J-100 Lobby<\/span><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<div style=\"font-size: 20px;font-weight: bold;padding: 10px;margin-left: 0;margin-bottom: 18px;border-radius: 4px;color: white;background-image: linear-gradient(135deg, #000000, #000000, #000000, #000000, #000000, #000000, #fec52e, #000000, #000000)\">Accepted Posters<\/div>\n<table style=\"height: 642px\" width=\"962\">\n<tbody>\n<tr>\n<td width=\"498\"><strong>Title<\/strong><\/td>\n<td width=\"222\"><strong>Authors<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"498\">Towards a Brain-Computer Interface Framework for Multi-Party Robot Applications<\/td>\n<td width=\"222\">Myles Lewis, Wesley Junkins, Chanakya Setty and Chris Crawford<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">Teaching Art Creation with Augmented Reality and Aero<\/td>\n<td width=\"222\">Kelechi Ariwodo, Carina George, Thien Nghi Duong, Anca Doloc-Mihu and Cindy Robertson<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">Gemini\u2019s Multimodal Prowess: Robust Detection of Adversarial Patch Attacks through Text and Image Inputs<\/td>\n<td width=\"222\">Shahrzad Sayyafzadeh, Hongmei Chi and Mark Weatherspoon<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">Teaching Sound Editing with Audacity and Makey Makey<\/td>\n<td width=\"222\">Kevin Rubio, Samuel Downs, Jasmine Roach, Ammar Mehicevic, Anca Doloc-Mihu and Cindy Robertson<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">Enhanced Test Case Expression for End-User Developers<\/td>\n<td width=\"222\">Ziliang Zhang and Jeff Gray<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">An Augmented Machine Learning-Based Course Enrollment Recommender System<\/td>\n<td width=\"222\">Lizi Zhu, Oleg Perchyk and Xiwei Wang<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">Evaluating LSTM Time Series Prediction Performance on Benchmark CPUs and GPUs in Cloud Environments<\/td>\n<td width=\"222\">Aditi Saha, Mohammad Rahman and Fan Wu<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">An Open-Source ChatBot by Using ParlAI<\/td>\n<td width=\"222\">Kiran Mai Narnavaram and Dan Chia-Tien Lo<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Schedule of Paper Presentations (Thursday 4\/18) &nbsp; Detailed Program Schedule (Long paper denoted by an asterisk at the end of the title) April 18, Room J-101 \u00a0 Session I. Exploring Innovations and Challenges in&#46;&#46;&#46;<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-621","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/acmse.net\/2024\/wp-json\/wp\/v2\/pages\/621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acmse.net\/2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acmse.net\/2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acmse.net\/2024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/acmse.net\/2024\/wp-json\/wp\/v2\/comments?post=621"}],"version-history":[{"count":39,"href":"https:\/\/acmse.net\/2024\/wp-json\/wp\/v2\/pages\/621\/revisions"}],"predecessor-version":[{"id":694,"href":"https:\/\/acmse.net\/2024\/wp-json\/wp\/v2\/pages\/621\/revisions\/694"}],"wp:attachment":[{"href":"https:\/\/acmse.net\/2024\/wp-json\/wp\/v2\/media?parent=621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}