Skip Content
You are currently on the new version of our website. Access the old version .

Engineering Proceedings

Engineering Proceedings is an open access journal dedicated to publishing findings resulting from conferences, workshops, and similar events, in all areas of engineering.
The conference organizers and proceedings editors are responsible for managing the peer-review process and selecting papers for conference proceedings.

All Articles (6,627)

  • Proceeding Paper
  • Open Access

TransLowNet: An Online Framework for Video Anomaly Detection, Classification, and Localization

  • Jonathan Flores-Monroy,
  • Gibran Benitez-Garcia and
  • Hiroki Takahashi
  • + 2 authors

This work presents TransLowNet, an online framework for video anomaly detection, classification, and spatial localization. The system segments incoming video streams into clips processed by an X3D-S feature extractor to obtain spatio-temporal representations, which are analyzed by dedicated modules for anomaly detection and recognition, while a MoG2-based stage estimates the spatial regions of anomalous activity. Evaluated on the UCF-Crime dataset, TransLowNet achieved 80.0% AUC, 54.5% accuracy, and 20.3% mAP@0.5, offering an efficient and interpretable approach for continuous video surveillance.

9 February 2026

Overview of the proposed modular framework for clip-level anomaly detection, classification, and spatial localization. The input video stream is segmented into consecutive clips, which are first processed by the feature extractor to obtain compact spatio-temporal representations. These representations are then evaluated by the anomaly detection module; if an anomaly is detected, the features are forwarded to the anomaly classification module to assign the event to a specific category, while the corresponding clips are simultaneously processed by the MoG2-based localization module to highlight the active regions associated with the anomalous action. The purple dashed arrow indicate the propagation of clip-level feature vectors extracted by the feature extractor toward the anomaly classifier module (purple box), whereas the pink dashed path denotes the direct use of raw RGB clips for spatial localization without additional feature extraction.

New Advances and Methodologies in the Field of Time Series and Forecasting—ITISE-2025

  • Olga Valenzuela,
  • Fernando Rojas and
  • Ignacio Rojas
  • + 2 authors

ITISE-2025 (11th International conference on Time Series and Forecasting) seeks to provide a forum for scientists, engineers, educators, and students to discuss the latest ideas and realizations in the foundations, theory, and models of and applications for interdisciplinary and multidisciplinary research encompassing disciplines of computer science, mathematics, statistics, forecaster, econometric, etc [...]

6 February 2026

  • Proceeding Paper
  • Open Access

A Forest Mapping Model for Algeria Using Noisy Labels and Few Clean Data

  • Lilia Ammar Khodja,
  • Meziane Iftene and
  • Mohammed El Amin Larabi

This study proposes a forest mapping framework for Algeria that addresses the challenge of limited clean data and noisy global land cover labels. The approach combines a small set of manually curated annotations with noisy ESA WorldCover data, leveraging Sentinel-2 multispectral imagery and Digital Elevation Model (DEM) features such as slope, aspect, and the Normalized Difference Vegetation Index (NDVI). A modified ResNet-18 architecture was fine-tuned using both clean and pseudo-labeled noisy data, enabling the model to effectively mitigate label noise. The framework achieved an overall accuracy of 98.5%, demonstrating strong generalization across Algeria’s diverse forest ecosystems. These results highlight the potential of semi-supervised deep learning to improve large-scale forest monitoring, with applications in conservation, sustainable resource management, and climate change mitigation.

6 February 2026

  • Proceeding Paper
  • Open Access

New Approach for Jamming and Spoofing Detection Mechanisms for High Accuracy Solutions

  • María Crespo,
  • Adrián Chamorro and
  • Ana González
  • + 1 author

It is well-known that GNSS high accuracy solutions are increasingly vulnerable to jamming and spoofing attacks, posing significant challenges to their reliability, security, and accuracy. In the past years, GNSS communities have witnessed an increase in the frequency and sophistication of these attacks, driven, among other factors, by the widespread availability of low-cost, off-the-shelf equipment capable of denying or even totally misleading GNSS-based positioning systems. On the one hand, jamming attacks aim at inhibiting signal reception by introducing high-power noise or interference, leading to degraded performance or complete failure in determining position. Jamming detection mechanisms need to be traced to GNSS receiver mitigation measures at signal processing level to analyze the radio frequency (RF) environment or receiver behavior. Signal-to-noise ratio (SNR) monitoring, power spectrum analysis, and signal power monitoring are commonly used to detect anomalies in signal characteristics. Jamming is often indicated with the presence of a combination of one or more dedicated indicators, opening space to characterize different levels of jamming attack allowing to optimize a response at user level. On the other hand, detecting spoofing attacks requires different advanced techniques to identify anomalies in satellite signals, receiver behavior, or consistency of computed position data. Indicators regarding internal consistency checks, as well as unexpected evolutions of GNSS signals, are typically suspicious behaviors to be analyzed as possible attacks. Additionally, ensuring trust in the received navigation information by including cryptographic authentication mechanisms is key to quickly detecting some kinds of spoofing. This paper presents the latest enhancements on jamming and spoofing detection and mitigation mechanisms for GMV GSharp® high accuracy and safe positioning solution. This new method, based on fuzzy logic systems, allows us to distinguish between different levels of attack and adapt the reactions to reduce the impact on the final user as much as possible. Additionally, test results obtained from real GNSS attacks datasets will be shown.

6 February 2026

News & Conferences

Issues

Open for Submission

Editor's Choice

Reprints of Collections

2024 IEEE 7th International Conference on Knowledge Innovation and Invention
Reprint

2024 IEEE 7th International Conference on Knowledge Innovation and Invention

Editors: Teen-Hang Meen, Chun-Yen Chang, Cheng-Fu Yang
The International Conference on Electronics, Engineering Physics and Earth Science (EEPES 2025)
Reprint

The International Conference on Electronics, Engineering Physics and Earth Science (EEPES 2025)

Volume II
Editors: Teodor Iliev, Ivaylo Stoyanov, Grigor Mihaylov, Panagiotis Kogias, Jacob Fantidis

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Eng. Proc. - ISSN 2673-4591