Available Online: 01 Jul 2025
A Novel MLLM-based Approach for Autonomous Driving in Different Weather Conditions
Volume 2

Available Online: 01 Jul 2025
Volume 2
Available Online: 30 Jun 2025
Volume 2
While expensive hardware has historically dominated emotion recognition, our research explores the viability of cost-effective alternatives by utilising IoT-based low-resolution cameras with Vision Transformers (ViTs) and Convolutional Neural Networks (CNNs). In this work, we introduce a novel dataset specifically for thermal facial expression recognition and conduct a comprehensive performance analysis using ResNet, a standard ViT model developed by Google, and a modified ViT model tailored to be trained on smaller..
Available Online: 23 Jun 2025
Volume 2
COVID-19 has created a major public health problem worldwide and other problems such as economic crisis, unemployment, mental distress, etc. The pandemic is deadly in the world and involves many people not only with infection but also with problems, stress, wonder, fear, resentment, and hatred. Twitter is a highly influential social media platform and a significant source of health-related information, news, opinion and public sentiment where information is shared by..
Available Online: 19 May 2025
Volume 2
Quantum computing presents significant issues to the current cryptographic landscape, especially with the upcoming deployment of 6G networks. Traditional cryptographic algorithms, such as Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC), are vulnerable to quantum-based attacks, leading to the need for Post-Quantum Cryptography (PQC), Quantum Key Distribution (QKD), and Satellite-based QKD solutions. This paper offers a comprehensive review of these quantum-safe technologies, discussing their integration within the context of 6G networks...
Available Online: 16 May 2025
Volume 2
This paper presents a fuzzy, computational model for the natural languish word ‘human intelligence’. This is a mathematical model that takes into account various interpretations of the word “intelligent” and enables comparisons between them for a given IQ index. The model is a linguistic variable mathematical model, built especially for the word ‘human intelligence’ and is called the ‘human intelligence’ linguistic variable. The model is constructed systematically along the whole..
Published: 12 May 2025
Volume 2
The field of Artificial Intelligence (AI) is progressively transforming various advanced engineering disciplines, including mechanical, civil, electrical, aerospace, environmental, and biomedical engineering, through improved design, manufacturing, maintenance, and optimization methodologies. Yet, the disjointed and specialized state of the art too frequently prevents the cross-disciplinary application of AI solutions due to disparate performance measures, which result in reduced knowledge transfer and exaggerated performance in segregated domains. This study overcomes these issues..
Published: 04 Mar 2025
Volume 2
Published: 20 Mar 2025
Volume 2
Dementia is a decline in cognitive function, typically diagnosed when the acquired impairment becomes severe enough to impact social or occupational functioning. Between no cognitive impairment (NCI) and dementia, there are many intermediate states. Predictive cognitive impairment can be useful for initiating treatment to prevent further brain damage. Several deep learning-based approaches have been proposed for the classification of Magnetic Resonance Imaging (MRI) to diagnose Alzheimer’s disease (AD) or dementia...
Published: 31 Dec 2024
Volume 1
Welcome to the inaugural volume of the Computing & AI Connect (CAIC) Journal, a peer-reviewed, open-access journal committed to fostering advancements and innovation in computing sciences and technologies, and artificial intelligence. CAIC is a platform that is dedicated to exploring the profound and transformative impacts of computing and artificial intelligence on the different aspects of life. In recent years, AI has become the focus of researchers from different fields, working to..
Published: 07 Feb 2025
Volume 2
Modern electrical systems rely on sensors and relays for fault detection in three-phase transmission lines and distribution transformers, but these devices often face time complexity issues and false alarms. In this study, the fault detection accuracy is compared in models studied in 2023 and 2024 following PRISMA guidelines. The objectives were to identify fault types, utilize machine learning models to assess their predictive efficacy, and establish accuracy levels. To explore..
Published: 28 Aug 2024
Volume 1
Network segmentation is a very important approach in enhancing network security. The approach involves breaking down the network into smaller, more manageable segments, each with its own specific security requirements. This strategy supports maintaining stable perimeters and effective access control while safeguarding critical resources, such as database servers, from unauthorized access. The relevance of network segmentation in IIoT comes with the state-of-the-art and interconnected nature of many devices that may..
Published: 02 Aug 2024
Volume 1
Effective indoor navigation in the presence of dynamic obstacles is crucial for mobile robots. Previous research on deep reinforcement learning (DRL) for robot navigation has primarily focused on expanding neural network (NN) architectures and optimizing hardware setups. However, the impact of other critical factors, such as backward motion enablement, frame stacking buffer size, and the design of the behavioral reward function, on DRL-based navigation remains relatively unexplored. To address this..
Published: 29 Jul 2024
Volume 1
This paper presents a smart diagnostic framework for dental smile analysis. To accurately and efficiently identify esthetic issues from a single image of a smile, a convolutional neural network (CNN) was trained. To overcome the limitations of scarce data, a diffusion model was employed to generate dental smile images in addition to manually curated data. The CNN was trained and evaluated on three datasets: all real images, all generated images,..
Published: 13 Jun 2024
Volume 1
Lossy compression has become an essential technique to reduce data size in many domains. This type of compression is especially valuable for large-scale scientific data, whose size ranges up to several petabytes. Although Autoencoder-based models have been successfully leveraged to compress images and videos, such neural networks have not widely gained attention in the scientific data domain. Our work presents a neural network that not only significantly compresses large-scale scientific..
Published: 07 May 2025
Volume 2
The advent of 5G networks has facilitated various Industry 4.0 applications requiring stringent Quality-of-Service (QoS) demands, notably Ultra-Reliable Low-Latency Communication (URLLC). Multi-Access Edge Computing (MEC) has emerged as a key technology to support these URLLC applications by bringing computational resources closer to the user, thus reducing latency. Meanwhile, Network Function Virtualization (NFV) supports 5G networks by offering flexibility and scalability in service provisioning across various applications. Despite their benefits, MEC..
Published: 06 May 2025
Volume 2
Web tracking (WT) systems are advanced technologies that are used to monitor and analyze online user behavior. Initially focused on HTML and static webpages, these systems have evolved with the proliferation of IoT, edge computing, and Big Data, encompassing a broad array of interconnected devices with APIs, interfaces, and computing nodes for interaction. WT systems are pivotal in technological innovation and business development, although trends like GDPR complicate data extraction..
Published: 31 Dec 2024
Volume 1
The explosive growth of the Internet of Things (IoT) has significantly increased networked devices within distributed and heterogeneous networks. Due to these networks’ inherent vulnerabilities and diversity, the proliferation of IoT devices presents substantial security challenges. Traditional security solutions face challenges in keeping up with the constantly changing threats in dynamic situations. This article reviews the application of distributed Reinforcement Learning approaches to enhance IoT security in dispersed and heterogeneous..
Published: 15 Nov 2024
Volume 1
Crowd-sourcing has been widely explored for monitoring and feedback on infrastructure and services, such as air and water quality analysis. However, the traditional methods of crowd-sourcing for feedback and analysis of water quality, such as offline and online surveys, have several limitations, such as the limited number of participants and low frequency due to the labor involved in conducting such surveys. Social media analytics could overcome these challenges by providing..
Published: 27 Oct 2024
Volume 1
This article presents a complex vision on software production practices aimed at enhancing the Scrum methodology within software project management. The recommended best practices are closely aligned with contemporary trends in the IT sector, including the total digitalization and virtualization of production processes, the transition to fully remote software development models, the incorporation of artificial intelligence technologies, and the implementation of cost-effective models in team organization. The modifications to software..