Skip Content
You are currently on the new version of our website. Access the old version .

Most Recent

  • Proceeding Paper
  • Open Access
Eng. Proc.2026, 126(1), 7;https://doi.org/10.3390/engproc2026126007 
(registering DOI)

6 February 2026

The maritime industry is experiencing significant growth due to globalized trade, but this expansion has led to increasing environmental concerns. Studies project that shipping emissions could reach 90–130% of 2008 levels by 2050 without interv...

  • Proceeding Paper
  • Open Access

State Road Pavement Maintenance

  • Karolina Vukelić and
  • Sanja Dimter
Eng. Proc.2026, 125(1), 17;https://doi.org/10.3390/engproc2026125017 
(registering DOI)

6 February 2026

This paper focuses on a section of the state road D28, Bjelovar northern bypass, Republic of Croatia, which was opened to traffic in 2002. Following the expiration of the 20-year design service life, it was determined that the section required recons...

  • Proceeding Paper
  • Open Access

Deep Learning Assisted Composite Clock: Robust Timescale for GNSS Through Neural Network

  • Gaëtan Fayon,
  • Alexander Mudrak,
  • Hugo Sobreira and
  • Artemio Castillo
Eng. Proc.2026, 126(1), 2;https://doi.org/10.3390/engproc2026126002 
(registering DOI)

5 February 2026

This study introduces the Deep Learning Assisted Composite Clock (DLACC), aiming to improve the robustness of the GNSS timescale. If traditional Kalman filter-based composite clocks are today used in systems like GPS and EGNOS, the non-linear, non-Ga...

  • Proceeding Paper
  • Open Access
Eng. Proc.2025, 120(1), 55;https://doi.org/10.3390/engproc2025120055 
(registering DOI)

6 February 2026

In this study, we emphasize that the maximum sum rate can be achieved through AI-based subchannel allocation, while taking into account all users’ quality of service (QoS) requirements in data rates for hybrid beamforming systems. We assume a l...

  • Proceeding Paper
  • Open Access
Eng. Proc.2025, 112(1), 82;https://doi.org/10.3390/engproc2025112082 
(registering DOI)

6 February 2026

This article provides an in-depth evaluation of sustainability performance within the mining sector by employing the Fuzzy Analytic Network Process (FANP). The assessment centers on five fundamental dimensions: economic, social, environmental, operat...

  • Proceeding Paper
  • Open Access
Eng. Proc.2025, 120(1), 53;https://doi.org/10.3390/engproc2025120053 
(registering DOI)

6 February 2026

Future wireless networks require efficient device-to-device (D2D) communication to meet the demands of increasing connectivity; however, practical challenges such as limited coverage and severe interference persist. This paper addresses these issues...

  • Proceeding Paper
  • Open Access
Eng. Proc.2025, 120(1), 57;https://doi.org/10.3390/engproc2025120057 
(registering DOI)

6 February 2026

We investigated how adding interaction modules—including a category-themed image, slogan, and narrative text—affects user attention during exploratory browsing within category-based recommender interfaces. Eye-tracking data and post-task...

  • Proceeding Paper
  • Open Access

GRIPP: An Open-Source and Portable Software-Defined Radio-Oriented GNSS/SBAS Receiver

  • Gaëtan Fayon,
  • Nicolas Castel,
  • Hugo Sobreira,
  • Ciprian-Vladut Circu,
  • Noori Bni Lam,
  • Marnix Meersman,
  • Leia Nummisalo,
  • Ruediger Matthias Weiler,
  • Jörg Hahn and
  • Nityaporn Sirikan
  • + 1 author

6 February 2026

This paper introduces the GRIPP (GNSS/SBAS Receiver, Independent and Portable PVT) system, an open-source SDR oriented GNSS/SBAS receiver. Composed of a Pocket SDR FE device, an L-band antenna and a computer, this system aims to ease the deployment a...

  • Proceeding Paper
  • Open Access

Hybrid System for Geoanalysis: Comparative and Integrated Use of Relational and Graph Databases

  • Goran Mitrović,
  • Tomislav Galba,
  • Alfonzo Baumgartner and
  • Časlav Livada

6 February 2026

Geospatial data analysis systems are currently very relevant. Most such systems use either relational databases or graph databases. This paper presents the idea of using both approaches, taking into account the main features and advantages of each. A...

  • Proceeding Paper
  • Open Access

Vulnerabilities in the DNP 3.0 Communication Protocol in ICS/SCADA Systems on Critical Electrical Infrastructure

  • Jacinto Pérez García,
  • Ana Lucia Sandoval Orozco and
  • Luis Javier García Villalba

4 February 2026

Supervisory control and data acquisition systems are an essential part of industrial control systems that form part of the critical infrastructure in the energy sector, which in the last decade have increased their interconnection, complexity, and de...

  • Proceeding Paper
  • Open Access

Monitoring Radio Frequency Interference Affecting GNSS Using Android Smartphones

  • Javier Tegedor,
  • Ciro Gioia,
  • Marco Barbero,
  • Stefano Luzardi and
  • Gianluca Folloni

5 February 2026

Global Navigation Satellite Systems (GNSSs) are exploited in a wide range of applications, and their reliability and accuracy are more critical than ever. Weak GNSS signals are extremely susceptible to intentional or unintentional interference. The J...

  • Proceeding Paper
  • Open Access

Towards Reliable 6G: Intelligent Trust Assessment with Hybrid Learning

  • Elmira Saeedi Taleghani,
  • Ronald Iván Maldonado Valencia,
  • Ana Lucila Sandoval Orozco and
  • Luis Javier García Villalba

6 February 2026

Sixth-generation (6G) networks will operate with pervasive autonomy and minimal centralised control, imposing stringent requirements on security and trust. This short communication presents a hybrid trust evaluation approach that combines fuzzy infer...

  • Proceeding Paper
  • Open Access

5 February 2026

This paper presents the work on integrating our Vision-Aided Inertial Navigation System (VaINS) with orthophoto matching to increase robustness to GNSS failure. Normalized cross-correlation is used to match onboard camera images with geo-referenced a...

  • Proceeding Paper
  • Open Access

5 February 2026

The Galileo High Accuracy Service (HAS) offers free, real-time precise point positioning (PPP) corrections via Galileo (E6-B) and internet, supporting Galileo (E1, E5a, E5b, E6) and GPS (L1, L5) signals. As of Service Level 1, HAS provides SSR orbit,...

  • Proceeding Paper
  • Open Access

Bridging Forecasts and Mitigation Through Retrieval-Augmented Time-Series Models for Cybersecurity Incidents

  • Aldo Hernandez-Suarez,
  • Gabriel Sanchez-Perez,
  • Linda Karina Toscano-Medina,
  • Hector Perez-Meana,
  • Jose Portillo-Portillo,
  • Jesus Olivares Mercado and
  • Enrique Escamilla-Hernandez

5 February 2026

In Cyber Threat Intelligence, anticipating threat events and linking forecasts to standards-based mitigations is essential, yet many approaches rely on non-unified event representations within the analysis window, introducing bias and weakening tacti...

  • Proceeding Paper
  • Open Access
13 Views
9 Pages

5 February 2026

The rapid decline of linguistic diversity, driven by globalization and technological standardization, presents significant challenges for the preservation of endangered languages, many of which lack sufficient parallel corpora for effective machine t...

  • Proceeding Paper
  • Open Access
16 Views
10 Pages

AI-Driven Spatiotemporal Mapping and Grid Optimization for Solar and Wind Energy

  • Rahul Jain,
  • Sushil Kumar Singh,
  • Habib Khan,
  • Om Prakash Pal,
  • Sejal Mishra and
  • Bhavisha Suthar

5 February 2026

Renewable energy sources play a critical role in modern energy production and transmission systems. This paper presents a GIS-enhanced deep learning framework for spatially informed renewable energy potential assessment, integrating environmental var...

  • Proceeding Paper
  • Open Access
14 Views
9 Pages

5 February 2026

As a fundamental component of GNSS signals, messages act as a critical medium for transmitting information required for PNT, serving the needs of both service providers and users. Over the years, message structures for GNSS signals have evolved from...

  • Proceeding Paper
  • Open Access
16 Views
5 Pages

Adversarial Attacks on Machine Learning Models for Network Traffic Filtering

  • Luis Alberto Martínez Hernández,
  • Sandra Pérez Arteaga,
  • Ana Lucila Sandoval Orozco and
  • Luis Javier García Villalba

5 February 2026

Due to people’s increasing access to computers, IT security has become extremely important in today’s society. This increase in connectivity has also led cybercriminals to take advantage of the anonymity and privacy offered by the Interne...

  • Proceeding Paper
  • Open Access
22 Views
8 Pages

Design of a Fault-Tolerant BCD to Excess-3 Code Converter Using Clifford+T Quantum Gates

  • Sandip Das,
  • Shankar Prasad Mitra,
  • Sushmita Chaudhari and
  • Riya Sen

4 February 2026

Quantum computing has the potential to transform modern computation by offering exponential advantages in areas such as cryptography, optimization, and intelligent data processing. To effectively realize these advantages, particularly in fault-tolera...

  • Proceeding Paper
  • Open Access
14 Views
9 Pages

5 February 2026

Fine particulate matter (PM2.5) is a hazardous air pollutant that poses serious risks to human health. Long-term exposure to high concentrations of PM2.5 increases the likelihood of developing cardiovascular and respiratory diseases. Therefore, accur...

  • Proceeding Paper
  • Open Access
22 Views
8 Pages

5 February 2026

Tracert-retrieval-augmented generation (RAG) is a novel retrieval-augmented framework designed for efficient, document-level multi-hop reasoning. Unlike conventional RAG systems that retrieve top-k text segments based solely on dense similarity, Trac...

  • Proceeding Paper
  • Open Access
29 Views
10 Pages

5 February 2026

We developed an AI-assisted zero-trust control system at low capital expenditure to retrofit brownfield Ethernet environments without disruptive hardware upgrades or costly software-defined networking migration. Legacy network infrastructures in smal...

  • Proceeding Paper
  • Open Access
33 Views
6 Pages

Magnetic Thin Film Inductor Characteristics and Packaging Stress

  • Yungching Chao,
  • Tingsheng Chang and
  • Deshin Liu

5 February 2026

We investigated how mechanical material properties, magnetic material properties, and geometric structure affect the performance of magnetic inductors. Magnetic thin film samples were prepared using a sputter deposition system. Mechanical properties,...

  • Proceeding Paper
  • Open Access
27 Views
7 Pages

5 February 2026

We developed a deep learning model for automated extraction and assessment of earthquake damage from dashcam and post-disaster images. By combining a custom-designed deep multi-layer perceptron model with an enhanced feature extraction methodology, w...

  • Proceeding Paper
  • Open Access
23 Views
5 Pages

Use of Natural Language Processing Techniques for Forensic Analysis in Spanish

  • Luis Alberto Martínez Hernández,
  • Ana Lucila Sandoval Orozco and
  • Luis Javier García Villalba

4 February 2026

In the digital forensics process, an essential step is the analysis of evidence contained in seized devices, a task that requires a significant investment of time to identify patterns and evidence that strengthen a judicial investigation. Advances in...

  • Proceeding Paper
  • Open Access
27 Views
5 Pages

Explainable Reputation Estimation from Web Service Reviews

  • Elmira Saeedi Taleghani,
  • Ronald Iván Maldonado Valencia,
  • Ana Lucila Sandoval Orozco and
  • Luis Javier García Villalba

5 February 2026

Star ratings alone are noisy, manipulable, and ignore aspect-level sentiment. We present Scrape2Repute, a compact and reproducible pipeline that ingests Yelp reviews under policy constraints; cleans and normalises text/metadata; learns a calibrated t...

  • Proceeding Paper
  • Open Access
40 Views
5 Pages

MAS-Hunt: A Resilient AI Multi-Agent System for Threat Hunting

  • Paulo Matheus Nicolau Silva,
  • Daniel Alves da Silva,
  • Robson de Oliveira Albuquerque,
  • Georges Daniel Amvame Nze and
  • Fábio Lúcio Lopes de Mendonça

5 February 2026

Modern cyber threats exhibit sophisticated, evasive behaviors that overwhelm traditional security systems, leading to prolonged periods of attackers remaining undetected. AI-driven autonomous agents promise a proactive solution but are themselves vul...

  • Proceeding Paper
  • Open Access
23 Views
5 Pages

Detection of Vulnerabilities in Tensorflow with LSTM and BERT

  • Sergio Muñoz Martín,
  • Luis Alberto Martinez Hernandez,
  • Ana Lucila Sandoval Orozco and
  • Luis Javier García Villalba

4 February 2026

This work has developed a Deep Learning model that analyses the semantics of the Python code used when working with TensorFlow and detects vulnerabilities to improve data security and bug recognition. This research not only seeks to improve the secur...

  • Proceeding Paper
  • Open Access
41 Views
5 Pages

Privacy and Security in Mobile Applications Assisted by Artificial Intelligence

  • Sandra Pérez Arteaga,
  • Ana Lucila Sandoval Orozco and
  • Luis Javier García Villalba

5 February 2026

The use of technology in mobile devices and the integration of Artificial Intelligence offers a wide range of benefits and personalised services that help users perform countless activities that assist them in their daily lives, such as at work, scho...

  • Proceeding Paper
  • Open Access
35 Views
8 Pages

4 February 2026

In early-stage product ideation, generative AI has emerged as a design support tool, yet most prompts still rely on designers’ subjective intent with limited grounding in user context. Therefore, we developed a user-centered prompting method, i...

  • Proceeding Paper
  • Open Access
29 Views
7 Pages

4 February 2026

Dental composite reconstructive materials (DCRMs) used in caries treatment possess satisfactory functional properties but lack antimicrobial activity, which may lead to secondary caries. This research aimed to modify the DCRM matrix with urethane-dim...

  • Proceeding Paper
  • Open Access
48 Views
4 Pages

Artificial Intelligence for Intrusion Detection Through Side-Channel Techniques

  • Felipe Lemus-Prieto,
  • José-Luis González-Sánchez and
  • Andrés Caro

4 February 2026

The rapid expansion of Internet of Things (IoT) technologies has introduced diverse applications while simultaneously exposing devices to increasing cybersecurity risks. Sensitive data handled within IoT networks and the limited resources of connecte...

  • Proceeding Paper
  • Open Access
40 Views
5 Pages

Transparent Trust Assessment in 6G Using Blockchain

  • Ronald Iván Maldonado Valencia,
  • Elmira Saeedi Taleghani,
  • Jesús Angel Alonso Lopez,
  • Ana Lucila Sandoval Orozco and
  • Luis Javier García Villalba

4 February 2026

Trust assurance will be a cornerstone of the security and autonomy of sixth-generation (6G) networks. Traditional trust models focus on data authenticity and integrity; however, 6G systems increasingly rely on autonomous decision-making. This article...

  • Proceeding Paper
  • Open Access
87 Views
5 Pages

A Lightweight Deep Learning Framework for Robust Video Watermarking in Adversarial Environments

  • Antonio Cedillo-Hernandez,
  • Lydia Velazquez-Garcia and
  • Manuel Cedillo-Hernandez

5 February 2026

The widespread distribution of digital videos in social networks, streaming services, and surveillance systems has increased the risk of manipulation, unauthorized redistribution, and adversarial tampering. This paper presents a lightweight deep lear...

  • Proceeding Paper
  • Open Access
47 Views
6 Pages

4 February 2026

The increasing demand for sustainable development necessitates sophisticated computational frameworks that facilitate intricate, long-term decision-making in circular economy systems. Therefore, we developed a novel machine learning based Markov deci...

  • Proceeding Paper
  • Open Access
42 Views
8 Pages

4 February 2026

This study aims to model and optimize the process parameters influencing the efficiency and yield of oil extraction from Mongolian sea buckthorn seeds using supercritical carbon dioxide (CO2). The experiments were planned using response surface metho...

  • Proceeding Paper
  • Open Access
48 Views
6 Pages

4 February 2026

We present a computational model for studying morphogenesis based on pairwise interactions among cells in this article. Extending a previous single-particle model, we represent each cell using two particles connected by an internal link. This two-par...

  • Proceeding Paper
  • Open Access
118 Views
13 Pages

REST API Fuzzing Using API Dependencies and Large Language Models

  • Chien-Hung Liu,
  • Shu-Ling Chen and
  • Kuang-Yao Li

3 February 2026

With the widespread adoption of cloud services, ensuring the quality and security of the representational state transfer application programming interface (REST API) has become critical. Among various REST API testing techniques, fuzz testing stands...

  • Proceeding Paper
  • Open Access
105 Views
8 Pages

Predicting Origin-Destination Traffic with Advanced Spatio-Temporal Networks

  • Bo-Yan Zeng,
  • Yen-An Chen,
  • Shih-Hung Yang,
  • Fandel Lin,
  • Donna Hsu and
  • Hsun-Ping Hsieh

3 February 2026

Existing origin-destination (OD) forecasting models struggle to jointly capture local topology and global flow patterns in urban mobility. Therefore, we developed a multi-view spatio-temporal network (MVSTN), a novel dual-branch spatio-temporal model...

  • Proceeding Paper
  • Open Access
86 Views
9 Pages

2 February 2026

With the implementation of the 2022 revised curriculum in South Korea, significant changes are taking place in education as of 2025. This curriculum emphasizes self-directed learning and a proactive attitude toward life, which are essential in the er...

  • Proceeding Paper
  • Open Access
192 Views
19 Pages

Machine Learning-Based Prognostic Modeling of Thyroid Cancer Recurrence

  • Duppala Rohan,
  • Kasaraneni Purna Prakash,
  • Yellapragada Venkata Pavan Kumar,
  • Gogulamudi Pradeep Reddy,
  • Maddikera Kalyan Chakravarthi and
  • Pradeep Reddy Challa

3 February 2026

Thyroid cancer is the most common type of endocrine cancer. Most cases are called differentiated thyroid cancer (DTC), which includes papillary, follicular, and hurthle cell types. DTC usually grows slowly and has a good prognosis, especially when fo...

  • Proceeding Paper
  • Open Access
96 Views
12 Pages

Mine Water Inrush Propagation Modeling and Evacuation Route Optimization

  • Xuemei Yu,
  • Hongguan Wu,
  • Jingyi Pan and
  • Yihang Liu

3 February 2026

We modeled water inrush propagation in mines and the optimization of evacuation routes. By constructing a water flow model, the propagation process of water flow through the tunnel network is simulated to explore branching, superposition, and water l...

  • Proceeding Paper
  • Open Access
68 Views
8 Pages

3 February 2026

This work studies the ability of a single-sided vibro-impact nonlinear energy sink (SSVI NES) and a tuned mass damper (TMD) to maintain their vibration reduction performance when the natural frequency of the primary structure (PS), which is determine...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Eng. Proc. - ISSN 2673-4591