


default search action
CSCI 2021: Las Vegas, NV, USA
- International Conference on Computational Science and Computational Intelligence, CSCI 2021, Las Vegas, NV, USA, December 15-17, 2021. IEEE 2021, ISBN 978-1-6654-5841-2
- Massimiliano Lupo Pasini, Junqi Yin:
Stable Parallel Training of Wasserstein Conditional Generative Adversarial Neural Networks : *Full/Regular Research Paper submission for the symposium CSCI-ISAI: Artificial Intelligence. 1-7 - Hieu Le, Andrew Wood, Sylee Dandekar, Peter Chin:
Neural Network Optimization with Biologically Inspired Low-Dimensional Manifold Learning. 8-13 - Luca Bondin, Alexiei Dingli:
A Federated Affective Computing Framework To Learn From Small Data. 14-19 - Mahee Noor Tayba, Pablo Rivas
:
Enhancing the Resolution of Satellite Imagery Using a Generative Model. 20-25 - Jingke She
, Shanshan Gong, Suyuan Yang, Tianzi Shi, Shaofei Lu, Heng Wu:
ConvGRU-TSNet: A Novel Deep Learning Approach for Multivariate Time Series Prediction. 26-33 - Philku Lee, Deyeon Kim, Seung Heon Lee, Seongjai Kim
:
PCA Approaches for Optimal Convolution Kernels in Convolutional Neural Networks. 34-39 - Korn Sooksatra, Pablo Rivas
:
On the Practical Uses of Experimental Adversarial Neural Cryptography. 40-46 - Meng-Long Wei, Shao-Yuan Li, Sheng-Jun Huang:
Weakly Supervised Crowdsourcing Learning Based on Adversarial Consensus. 47-51 - Pablo Rivas
, Liang Zhao, Javier Orduz
:
Hybrid Quantum Variational Autoencoders for Representation Learning. 52-57 - Amaya Shepard, Naim Naheed:
Application of Data Transformation Techniques and Train-Test sit. 58-63 - Pablo Rivas
, Donald R. Schwartz:
Modeling SQL Statement Correctness with Attention-Based Convolutional Neural Networks. 64-71 - Dominique Fabio Briechle, Sebastian Lawrenz:
Data Driven Process Evaluation Simulation Model For Circular Economy Treatment Processes. 72-78 - Bikram Khanal
, Pablo Rivas
, Javier Orduz
, Alibek Zhakubayev:
Quantum Machine Learning: A Case Study of Grover's Algorithm. 79-84 - Dena F. Mujtaba, Nihar R. Mahapatra:
Multi-Task Deep Neural Networks for Multimodal Personality Trait Prediction. 85-91 - Jiayi Wang, Lina Yang, Xichun Li, Zuqiang Meng:
Path-Enhanced Multi-hop Graph Attention Network for Aspect-based Sentiment Analysis. 92-97 - Elias Abdollahnejad, Marilynn Kalman, Behrouz H. Far:
A Deep Learning BERT-Based Approach to Person-Job Fit in Talent Recruitment. 98-104 - Michelle Hu, Yen-Hung Frank Hu
:
The Effects of Different Parameters on the Accuracy of Deep Learning Models for Predicting U.S. Citizen's Life Expectancy. 105-109 - Sanaa Abujilban
, Lina Mrayan, Shaher Hamaideh, Dheaya Alrousan, Hashim Abu-gellban:
Attitudes Toward Corona Vaccine and Intention Among University Students. 110-115 - Arkadiusz Czuba
:
Artificial Intelligence-Based Cognitive Radar Architecture. 116-120 - Bikram Khanal, Pablo Rivas
, Javier Orduz
:
Human Activity Classification Using Basic Machine Learning Models. 121-126 - Tami Alghamdi, Robert B. Heckendorn, Terence Soule:
Quantifying the Right Combination of Knowledge and Population Diversity for Transferred Populations. 127-133 - Nour El-Din Ali Said, Yassin Samaha, Eman Azab
, Lamia A. Shihata
, Maggie Mashaly:
An Online Reinforcement Learning Approach for Solving the Dynamic Flexible Job-Shop Scheduling Problem for Multiple Products and Constraints. 134-139 - Korn Sooksatra, Pablo Rivas
:
Adversarial Training Negatively Affects Fairness. 140-145 - Tsz Hin Martin Cheung, Erik Noyes, Leonidas Deligiannidis:
Face of the Team - Diversity, Equity, and Inclusion. 146-151 - Korn Sooksatra, Pablo Rivas
, Javier Orduz
:
Evaluating Accuracy and Adversarial Robustness of Quanvolutional Neural Networks. 152-157 - Jalal Omer Atoum:
Cyberbullying Detection Neural Networks using Sentiment Analysis. 158-164 - Yahong Lian, Jing Yun, Xiaoming Su, Zhiwei Xu:
Sequential Recommendation for Online Consumption by ACFNN. 165-169 - Phillip Roshon, Feng-Jen Yang:
A Study on Deep Learning Approach to Optimize Solving Construction Problems. 170-174 - Soheyla Amirian, Thiab R. Taha, Khaled Rasheed, Hamid R. Arabnia:
Generative Adversarial Network Applications in Creating a Meta-Universe. 175-179 - Christophe Feltus:
LogicGAN-based Data Augmentation Approach to Improve Adversarial Attack DNN Classifiers. 180-185 - Shu Liu, Qiang Wu
:
Pairwise Learning for Imbalanced Data Classification. 186-189 - Mohammadreza Iman, Khaled Rasheed, Hamid R. Arabnia:
EXPANSE, A Continual Deep Learning System; Research Proposal. 190-192 - Jingyi Zhao, Fahu He, Zhanlin Ji, Ivan Ganchev:
PM2.5 Prediction Based on the Combined EMD-LSTM Model. 193-195 - David Wu, Qiping Zhang:
An Altmetric Study of Artificial Intelligence in Medicine. 196-198 - Bate He, Eisuke Kita:
GA-Based Optimization of Generative Adversarial Networks on Stock Price Prediction. 199-202 - Liwei Jing, Lina Yang, Xichun Li, Zuqiang Meng:
Abstractive Text Summarization Using Generative Adversarial Network and Relation Extraction. 203-206 - Somayeh Bakhtiari Ramezani
, Logan Cummins, Brad Killen, Richard Carley, Shahram Rahimi, Maria Seale
:
Similarity Based Methods for Faulty Pattern Detection in Predictive Maintenance. 207-213 - Unaiza Ahsan, Yuanbo Wang, Alexander Guo, Kevin D. Tynes, Tianlong Xu, Estelle Afshar, Xiquan Cui:
Visually Compatible Home Decor Recommendations Using Object Detection and Product Matching. 214-220 - Edward Schwalb:
Prototyping: Sample Selection for Imbalanced Data. 221-227 - Julian Cagnazzo, Osama Sam Abuomar, Angel Yanguas-Gil, Jeffrey W. Elam:
Atomic Layer Deposition Optimization Using Convolutional Neural Networks. 228-232 - Nour Matta, Nada Matta, Evan Giret, Nicolas Declercq:
Enhancing Textual Knowledge Discovery using a Context-Awareness Approach. 233-237 - Sean Walker, Sharad Sharma:
Data Visualization Tool for Covid-19 and Crime Data. 238-242 - Guang Hu, Yue Tang:
A Predictive Analytics Approach Based on Grey-Markov for Digital Economy. 243-248 - Tyren Walker, Sharad Sharma:
Data Analysis of Crime and Rates of Hospitalization due to COVID-19. 249-254 - Farid Ghareh Mohammadi, Farzan Shenavarmasouleh
, Khaled Rasheed, Thiab R. Taha, M. Hadi Amini, Hamid R. Arabnia:
The application of Evolutionary and Nature Inspired Algorithms in Data Science and Data Analytics. 255-261 - Ray R. Hashemi, Omid M. Ardakani
, Jeffrey A. Young, Chanchal Tamrakar:
Mining the Impact of Social Media on High-Frequency Financial data. 262-267 - Ron Coleman:
A data science approach to readability. 268-272 - Oyeyemi Osho, Sungbum Hong, Tor A. Kwembe:
Network Intrusion Detection System Using Principal Component Analysis Algorithm and Decision Tree Classifier. 273-279 - Soeon Park, Mohammed Mahmoud, Sherrene Bogle:
Time Series Analysis of COVID-19 Cases in Humboldt County. 280-284 - Cheronika Manyfield-Donald, Tor A. Kwembe, Jing-Ru C. Cheng:
A Modified Clustering Using Representatives to Enhance and Optimize Tracking and Monitoring of Maritime Traffic in Real-time Using Automatic Identification System Data. 285-289 - Ayman Taha, Bernard Cosgrave, Wael Rashwan
, Susan McKeever:
Insurance Reserve Prediction: Opportunities and Challenges. 290-295 - Qinlu Li, Tao Du, Rui Zhang, Jin Zhou, Shouning Qu:
Research on the status of industrial sewage equipment based on clustering ensemble. 296-300 - Herious Cotton, Tor A. Kwembe:
Using Data Analytics to Forecast Violent Crime. 301-304 - Mahmood Mohammed, John R. Talburt, Serhan Dagtas, Melissa Hollingsworth:
A Zero Trust Model Based Framework For Data Quality Assessment. 305-307 - Carlos A. Barajas, Gerson C. Kroiz, Matthias K. Gobbert
, Jerimy C. Polf:
Classification of Compton Camera Based Prompt Gamma Imaging for Proton Radiotherapy by Random Forests. 308-311 - Seema Singh Saharan, Pankaj Nagar, Kate Townsend Creasy
, Eveline O. Stock, James Feng, Mary J. Malloy, John P. Kane:
Implementation of PCA enabled Support Vector Machine using cytokines to differentiate smokers versus nonsmokers. 312-317 - Youcef Derbal:
On Signaling Dysregulation in Cancer. 318-323 - Dimitrios Charalampidis:
Visualizing population substructures using multidimensional scaling and data smoothing. 324-329 - Luiz Henrique Pontes dos Santos, Jannison Karlly Cavalcante Ribeiro, Juliana Osório Alves, Maria Izabel Florindo Guedes
, Stela Mirla da Silva Felipe, Raquel Martins de Freitas, Paula Matias Soares, Cláudio Gleidiston Lima da Silva, Cristina Pacheco Santos, Eric Petterson Viana Pereira, Valdevane Rocha Araújo
, Vânia Marilande Ceccatto:
SARS-CoV-2 variant strains and viral phylodynamics of ORF1a-1b genetic aspects in South America. 330-336 - Payal Patel, Kalpdrum Passi, Chakresh Kumar Jain:
Improving Gene Expression Prediction of Cancer Data Using Nature Inspired Optimization Algorithms. 337-343 - Wenjuan Zhang, William Yang, John R. Talburt, Sherman Morton Weissman, Mary Qu Yang:
Missing Value Recovery for Single Cell RNA Sequencing Data. 344-348 - Andrew Smith, Hardik Anand, Snezana Milosavljevic, Katherine M. Rentschler
, Ana Pocivavsek
, Homayoun Valafar:
Application of Machine Learning to Sleep Stage Classification. 349-354 - Raul Magdaleno Peñaloza, Gerardo Reyes Salgado, Andrea Magadán Salazar:
Optimization of a classical algorithm for the alignment of genomic sequences with artificial bee colony. 355-360 - Elham Khorasani Buxton, Rushabh Patel, Mari R. Toumaian, Maryam Raeeszadeh-Sarmazdeh:
Application of Protein Language Models to low-N Engineering of metalloproteinase inhibitors. 361-365 - Punithavathi Sundaramurthy
, Brandon White, Wendy Lee
:
A Computational Approach to Identify Transcription Factor Binding Sites Containing Spacer Regions. 366-369 - Seema Singh Saharan, Pankaj Nagar, Kate Townsend Creasy
, Eveline O. Stock, James Feng, Mary J. Malloy, John P. Kane:
Application of Machine Learning Ensemble Super Learner for analysis of the cytokines transported by high density lipoproteins (HDL) of smokers and nonsmokers. 370-375 - Diksha Kool, Katy Kao, Wendy Lee
:
Understanding How the Relative Abundance of Candida Species Impacts Transcriptional Regulation in Co-culture Biofilms. 376-378 - Muhammed Akif Agca, Djamel Khadraoui, Mehmet Naci Efe:
Persisting Trust in Emerging Hybrid-Clouds and 6G Systems. 379-385 - Tolga Ovatman, Muhammed Enes Tirnakçi, Ahmet Yilmaz:
Utilizing HAPS Deployed Data Centers in Offloading Cloud Workloads. 386-391 - Sonam Yadav, Sindhura Gali, Saranya Bangarusamy, Mohammed Mahmoud:
Addressing the Small Files Issue in Hadoop. 392-396 - Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Bobby Yang:
MOBDroid2: An Improved Feature Selection Method for Detecting Malicious Applications in a Mobile Cloud Computing Environment. 397-403 - Noah Bankston, Sandy Jarkas, Tara Jubran, Noah Pape, Sterling Walker, Terrell Brooks, Mohammed Mahmoud:
Engineering Cloud Applications for the Workplace. 404-410 - Abhishek Phadke
, F. Antonio Medrano, Stanislav Ustymenko
:
A Review of Vehicular Micro-Clouds. 411-417 - Moloko P. Mothlabeng, Topside E. Mathonsi, Tonderai Muchenje
, Deon P. Du Plessis:
An Algorithm to Enhance Data Integrity in Cloud Computing. 418-424 - Olivera Kotevska, Folami Alamudun
, Christopher B. Stanley
:
Optimal Balance of Privacy and Utility with Differential Privacy Deep Learning Frameworks. 425-430 - Alexandre C. B. Delbem, Antonio Mauro Saraiva, João Bosco A. London Jr., Rodrigo Zempulski Fanucchi:
Sublinear evaluation of complex networks for extensive exploration of configurations for critical scenarios and decision making. 431-436 - Ireddy Siddhartha, Huixin Zhan, Victor S. Sheng:
Abstractive Text Summarization via Stacked LSTM*. 437-442 - Víctor Huilcapi, Xavier Blasco Ferragud, Juan M. Herrero, Alberto Pajares, Gilberto Reynoso-Meza:
Application of an input-output pairings selection methodology to control multivariable systems based on multi-objective optimization. 443-449 - Zein Shaheen, Gerhard Wohlgenannt, Dmitry Mouromtsev:
Zero-Shot Cross-Lingual Transfer in Legal Domain Using Transformer Models. 450-456 - Mitsuo Gen, Chuluunsukh Anudari, YoungSu Yun:
Hybridizing Teaching-Learning Based Optimization with GA and PSO: Case Study of Supply Chain Network Model. 457-462 - Won-Chul Shin, Hyun-Kyu Park, Young-Tack Park:
Knowledge Inference and Knowledge Completion Methods using Neuro-Symbolic Inductive Rules. 463-469 - Miku Kawai, Jumpei Ono, Takashi Ogata:
Kabuki Explanation System Based on User's Knowledge and Interests. 470-475 - Bing Sun, Chuan Wang, Qiang Yang, Weili Liu
, Weijie Yu:
Ant Colony Optimization for Balanced Multiple Traveling Salesmen Problem. 476-481 - Chuluunsukh Anudari, YoungSu Yun, Mitsuo Gen:
Hybrid Meta-heuristics Approach for Solving Supply Chain Network Model under Disruption Risk. 482-487 - Jonathan Bishop, Mark M. H. Goode:
Towards 'serendipity engineering for seductive hypermedia' and 'user analysis using socialnomics': The role of ecological cognition. 488-494 - Nikos Loukeris, Iordanis Eleftheriadis, G. Gikas:
Selecting Optimal Portfolio in Generalized Feed Forward networks and Support vector machines hybrids. 495-501 - Kevyn Kelso, Byeong Kil Lee:
Accordion AutoEncoders (A2E) for Generative Classification with Low Complexity Network. 502-505 - Tristan Lee, Byeong Kil Lee:
Splatter: An Efficient Sparse Image Convolution for Deep Neural Networks. 506-509 - Mirhossein Mousavi Karimi
, Shahram Rahimi:
A Two-Dimensional Model for Game Theory Based Predictive Analytics. 510-515 - Josef Dobes, David Cerný:
An Algorithm to Solve Systems of Nonlinear Differential-Algebraic Equations With Extraordinary Efficiency Even at High Demanded Precisions. 516-520 - Ionela S. Munayco, Marina Chugunova, Ali Nadim:
Non-Orthogonal HOSVD Applied to 3-D Image Compression. 521-526 - Samuel Grone, Weitian Tong
, Hayden Wimmer, Yao Xu
:
Arbitrage Behavior amongst Multiple Cryptocurrency Exchange Markets. 527-532 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval:
A New Unified Computational Method for Finding Confidence Intervals of Shortest Length and/or Equal Tails under Parametric Uncertainty. 533-539 - Anousha Athreya, S. Koby Taswell, Andrew Kang, Ishani Das, Carl Taswell:
Ashurbanipal: A Diristry to Document Multimedia Metadata Tools for Transdisciplinary Archives. 540-543 - Jun Zhang, Ruzong Fan, Fangyang Shen:
New Method for the Computation of Generating Functions with Applications. 544-549 - Jackeline del Carmen Huaccha Neyra
, Aurelio Ribeiro Leite de Oliveira:
Solving the dose distribution problem in the radiotherapy planning applying the interior point methods *. 550-555 - Flávio de Assis Vilela, Ricardo Rodrigues Ciferri:
A novel solution to perform real-time ETL process based on non-intrusive and reactive concepts. 556-561 - Mansoureh Lord, Adam Kaplan:
Mechanical Anomaly Detection on an Embedded Microcontroller. 562-568 - Arman Dehpanah, Muheeb Faizan Ghori, Jonathan Gemmell, Bamshad Mobasher
:
Player Modeling using Behavioral Signals in Competitive Online Games. 569-574 - Levi Meston, Jalal Kawash:
Scratch-Style Relational Algebra and Calculus. 575-581 - Kai Wang, Hong Zhang:
An Experimental Evaluation of a Function in Extremal Combinatorics. 582-586 - Zalán Heszberger, András Majdán, András Gulyás, András Biró, László Balázs, József Bíró:
Analysis of Routing Entropy in Hyperbolic Trees. 587-591 - Naoki Tojima, Akihiro Fujiwara:
Robust asynchronous P systems for basic operations. 592-597 - Kangrong Tan, Shozo Tokinaga:
Markov Regime Switching Analysis for the Pandemic and the Dynamics of German Market. 598-603 - Tianyu Shen, Youwei Wang, Tao Du, Shouning Qu:
Clustering algorithm based on k-value adaptive neighborhood selection. 604-608 - Fatma Mallouli
, Nesrine Khelifi, Aya Hellal, Eman Ferjani, Imen Gmach, Nada Chaabane, Rimah Amami, Rim Amami:
Cryptocurrency bounced back based on cryptography technology during the COVID-19 pandemic. 609-614 - Cheng-Chi Lee, Chung-Wei Li, Chun-Ta Li
, Chin-Ling Chen:
E-book Circulation System Based on Blockchain. 615-619 - Eman Azab
, Nour El-Din Ali Said, Mohamed Nafea, Yassin Samaha, Lamia A. Shihata
, Maggie Mashaly:
Employing Genetic Algorithm and Discrete Event Simulation for Flexible Job-Shop Scheduling Problem. 620-624 - Fady Nissan, Jacob Hamade, Jimmy Xiao, Jonah Ragle, Joshua Price, Julien Fares, Mohammed Mahmoud:
Blockchain as a Reliable Security Framework. 625-632 - Héctor Miguel Gastelum-González, Luis Antonio Gama Moreno, Ana Luisa Garcia-Corralejo:
Hybrid Push-Pull Systems: Classification, Optimal Methods and Uncertainty. 633-641 - Xuezhen Li, Takayuki Fujimoto:
Proposal for the Virtual Library that Enables the User to Control the Bookshelf based on the Concept of Timeline. 642-645 - Jumpei Ono, Takashi Ogata:
Multiple Story Generation Using Story Techniques Included in a Story : Full/Regular Research Paper, CSCI-ISCS. 646-650 - Hyungchan Kim, Yeonghun Shin, Sungbum Kim, Minju Kim, Wooyeon Jo, Taeshik Shon:
Data Deletion and Recovery of Androd Plaforms. 651-654 - Minju Kim, Yeonghun Shin, Wooyeon Jo, Taeshik Shon:
Security Analysis of Smart Watch and Band Devices. 655-658 - Shinjin Kang, Jongin Choi, Hyunjeong Tae, Soo Kyun Kim
:
Game Engine Based 2D Emotion Segmentation Generation Method. 659-660 - Kuntha Pin, Yunyoung Nam, Sangho Ha, Jung Woo Han:
Deep Learning Based on Ensemble to Diagnose of Retinal Disease using Optical Coherence Tomography. 661-664 - Maryam Bukhari, Muazzam Maqsood, Seungmin Rho:
Fake News Detection on Social Media for Sustainable Trust-based Social Networking. 665-670 - Changfeng Yu, Cheng Zhang, Hao Zhang, Jie Wang:
AutoTR: Efficient Reformatting Text Spread out in a DOM Tree for Text-Analytic Applications. 671-674 - Martin Peralta-Peterson, Olivera Kotevska:
Effectiveness of Privacy Techniques in Smart Metering Systems. 675-678 - Valentina Mazzonello
, Ernesto La Mattina, Roberto Acquaviva
, Gianluca Cinà, Marialuna De Tommaso, Youssef Bouali, Barbara Pirillo, Simone Simoncini:
The H2020 ANITA platform: generating knowledge about crime through user-centred innovative tools. 679-684 - Florian Sommer, Reiner Kriesten
, Frank Kargl:
Model-Based Security Testing of Vehicle Networks. 685-691 - Marco San-Biagio, Roberto Acquaviva
, Valentina Mazzonello
, Ernesto La Mattina, Vito Morreale:
A new SOCMINT framework for Threat Intelligence Identification. 692-697 - Josh Sahota, Natalija Vlajic:
Mozi IoT Malware and Its Botnets: From Theory To Real-World Observations. 698-703 - Takashi Iiguni, Hitoshi Kamei, Keizo Saisho:
Sprofiler: Automatic Generating System of Container-Native System Call Filtering Rules for Attack Surface Reduction. 704-709 - Jeremy Straub:
Consideration of the Use of Smart Grid Cyberattacks as an Influence Attack and Appropriate Deterrence. 710-715 - Yasin Kose, Murat Ozer
, Mehmet F. Bastug
, Said Varlioglu, Oguzhan Basibuyuk
, Hari Priya Ponnakanti:
Developing Cybersecurity Workforce: Introducing CyberSec Labs for Industry Standard Cybersecurity Training. 716-721 - Toby Houchens, Yanzhen Qu:
Measuring the Effectiveness of Investment in Security Treatments through a Security ROI Model. 722-727 - Haydar Teymourlouei, Vareva E. Harris:
Detecting Ransomware Automated Based on Network Behavior by Using Machine Learning. 728-734 - Minh Hieu Nguyen Ba, Jacob Bennett, Michael Gallagher, Suman Bhunia
:
A Case Study of Credential Stuffing Attack: Canva Data Breach. 735-740 - Amin Sarihi, Ahmad Patooghy, Mahdi Hasanzadeh
, Mostafa Abdelrehim, Abdel-Hameed A. Badawy:
Securing on-Chip Communications: An On-The-Fly Encryption Architecture for SoCs. 741-746 - J. D. Rudie, Zach Katz, Sam Kuhbander, Suman Bhunia
:
Technical Analysis of the NSO Group's Pegasus Spyware. 747-752 - Tina Alsadhan, Joon S. Park:
Leveraging Information Security Continuous Monitoring to Enhance Cybersecurity. 753-759 - Joshua Huddleston, Pu Ji, Suman Bhunia
, Joel Cogan:
How VMware Exploits Contributed to SolarWinds Supply-chain Attack. 760-765 - Jovana Dobreva, Aleksandra Popovska-Mitrovikj, Vesna Dimitrova:
MalDeWe: New Malware Website Detector Model based on Natural Language Processing using Balanced Dataset. 766-770 - Leonidas Deligiannidis:
Remote Video Surveillance. 771-776 - Brandon Gibson, Spencer Townes, Daniel Lewis, Suman Bhunia
:
Vulnerability in Massive API Scraping: 2021 LinkedIn Data Breach. 777-782 - Serge Chaumette, Titien Cubilier:
aMDH and TWIN: Two original honeypot-based approaches to protect swarms of drones. 783-787 - Yanzhen Qu, Adam English, Brace Hannon:
Quantifying the Impact of Vulnerabilities of the Components of an Information System towards the Composite Rise Exposure. 788-793 - Khalid Amen, Mohamed A. Zohdy, Mohammed Mahmoud:
Machine Learning for Multiple Stage Phishing URL Prediction. 794-800 - Guillermo Francia III, Gregory Hall:
Digital Twins for Industrial Control Systems Security. 801-805 - Nick Rahimi:
A Study of the Landscape of Security Issues, Vulnerabilities, and Defense Mechanisms in Web Based Applications. 806-811 - Woo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo
:
A Novel Traceback Technology for E-mail Sender Verification : Type of submission: Regular Research Paper / Most relevant symposium: CSCI-ISCW. 812-816 - Anusha Thapa, Abeer Alsadoon, Sreekanth Gopalakrishnan Nair, Muhammad Siddiqi, Rashidul Mubasher, Rajesh Ampani, Benoy Varghese, P. W. C. Prasad:
Taxonomy for Malware Detection to Enhance the Security of Smart Devices using AI. 817-822 - Richard Romero Izurieta
, Luis Jhony Caucha Morales, Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, Jose Antonio Orizaga Trejo
:
Analysis of the Information Security of Public Organizations in Ecuador. 823-829 - Atif Tirmizi, Osama Abuomar, Khaled M. Alzoubi:
Developing an API for Block-Cipher Encryption powered by Supervised Learning. 830-835 - Luiz Manella Pereira, S. Sitharama Iyengar
, M. Hadi Amini:
On the Impact of the Embedding Process on Network Resilience Quantification. 836-839 - Gary L. Wallace:
The Need for Certification-Based Security Curriculum: A Matter of National Security. 840-843 - Fanliang Hu, Huanyu Wang, Junnian Wang:
Deep-Learning Side-Channel Attack Against STM32 Implementation of AES. 844-847 - Vincent Hugot, Adrien Jousse, Christian Toinard, Benjamin Venelle:
A safe dynamic access control providing mandatory automotive cybersecurity. 848-851 - Fadi Al-Ayed
:
Zero-Trust Model of Cybersecurity: A Significant Challenge in the Future. 852-854 - Maura Mengoni, Silvia Ceccacci, Noemi Del Bianco, Ilaria D'Angelo, Simone Aperecida Capellini, Catia Giaconi:
Evaluation strategies at University for students with Dyslexia: a pilot study supported by face emotion recognition. 855-860 - Germán Terrazas, Gregory Hawkridge, Duncan C. McFarlane, Mike McNally:
Student Hackathons for Low Cost Digital Solutions. 861-865 - Stephanie Lunn
, Monique Ross, Jason Liu
:
Cybersecurity Integration: Deploying Critical Infrastructure Security and Resilience Topics into the Undergraduate Curriculum. 866-871 - Adam Kaplan:
A Dev-Ops Practicum Course for Information Technology Majors. 872-877 - Sandy Ingram
, Rania Islambouli, Miharisoa Andrianantenaina, Jean-Philippe Weisskopf, Philippe Masset, Nicole Baudat:
Learning Finance with Games: An Empirical Study. 878-882 - Mark Allison
, Stephen W. Turner, Molly Kwasny:
Assessing Cognitive Load for Junior Software Engineers: A Mixed-Method Study. 883-888 - Ibrahim A. Alharbi, Ali Jaber Almalki, Cliff C. Zou:
Hyperparameter Optimization and Comparison of Student Performance Prediction Algorithms. 889-894 - Xuguang Chen:
Redesigning An Undergraduate Course: Principles of Programming Languages. 895-899 - Miaoqing Chen, Ali A. Al-Babawat, Abeer Alsadoon, Srujal Patel, Razwan Mohmed Salah, P. W. Chandana Prasad:
A Circular Framework from Branding to Recruitment in Perspective of Higher Education : Type of the submission: Full/Regular Research Paper Symposium acronyms is: CSCI-ISED. 900-906 - Marianthi Manousi, Jim Prentzas:
Evaluation of Web-based Digital Storytelling Tools for Early Childhood Education. 907-912 - Xuejun Liang:
MarieSimR: The MARIE Computer Simulator Revision. 913-919 - Peter M. Maurer:
Computer Science Theory from a Practical Point of View. 920-924 - Aida Jafarian, Razwan Mohmed Salah, Abeer Alsadoon, Srujal Patel, Gustavo R. Alves
, P. W. C. Prasad:
Modify Flipped Model of Co-regulation and Shared-regulation Impact in Higher Education, and Role of Facilitator on Student's Achievement. 925-932 - S. M. U. P. Samarakoon, Thushani A. Weerasinghe
, Hakim Usoof
:
Usability Heuristics for Early Primary Children: A Case Study in Sri Lanka. 933-939 - Md Mahmudur Rahman, Roshan Paudel Morgan:
A Remote Instructional Approach with Interactive and Collaborative Learning to Teach an Introductory Programming Course during COVID-19 Pandemic. 940-946 - Sara Suleymanova, Amjad Gawanmeh, Wathiq Mansoor:
The Mental Challenges of Emergency Remote Learning: UAE Engineering Students Case Study. 947-952 - Stavros Tsetsos, Jim Prentzas:
A Blended Learning Approach Supporting the Improvement of Primary School Students' Performance. 953-958 - Kewei Sha, Wei Wei, Arpit Jain:
Design of Network Forensics Labs for Teaching-oriented Institutions. 959-963 - Dulal Chandra Kar, Scott Alan King, Dugan Um:
Supporting Undergraduates for Careers in Computing and Engineering with Scholarships and Supervision. 964-969 - Mathew Nicho
, Emad Bataineh, Tarannum Parkar:
Application of Consumptive Metrics to Measure Internship Alignment. 970-975 - Ereza Baftiu, Krenare Pireva Nuci
:
The transformation process from in-campus classes into online classes due to COVID-19 pandemic situation. 976-982 - Asmaa Elmahmoudi, Habiba Chaoui
, Nour El Houda Chaoui
:
Statistical Study and Intelligent Classroom Proposal Adapted to Students with Speech and Hearing Disabilities. 983-989 - Kewei Sha
:
Lessons and Experiences From Teaching Computing Science Capstone Project Courses. 990-995 - Min Je Cho
, Hyeon Jo
:
Impacts of COVID-19 and Social Measure on Behavioral Intention in the context of Online Learning Software. 996-1000 - Muhittin Yilmaz:
Undergraduate In-class Research Experience for Computer Architecture Students. 1001-1007 - Ashwag Maghraby, Safaa Qutub, Afraa Alandijani, Huda Alandijani, Linah Bakhsh, Nuha Alharbi:
A Real-Time Translation of Arabic Video Contents to Arabic Sign Language. 1008-1013 - Arshia Khan, Kathryn Milun
:
Designing Diversity, Service, and Active Learning For the Common Good in an Undergraduate Computer Science Course. 1014-1020 - Francielli Freitas Moro, Maria Paula Corrêa Angeloni
, Liane Margarida Rockenbach Tarouco, João Bosco da Mota Alves:
The use of Augmented Reality to promote learning in Science Laboratories. 1021-1025 - Frances C. Dancer
, April L. Tanner, Mary M. Thomas
:
Challenges of Incorporating a Mobile Device Forensics Detectives Summer Camp with Critical Thinking Amongst K-12 Students. 1026-1030 - Christian Rodríguez, Gerónimo Afonso, Lucas Di Cunzolo, Mauricio Foster, Leandro Di Tommaso, Fernando G. Tinetti:
Experiences with Hundreds of Similar and Customized Sites with DevOps. 1031-1036 - Antonio González Torres, Lilliana Sancho-Chavarría, Magaly Zuniga-Cespedes, Jorge Monge-Fallas, José Navas-Sú:
A strategy to assess computational thinking. 1037-1042 - Moh'd A. Radaideh:
Benchmarking the software engineering undergraduate program curriculum at Jordan university of science and technology with the IEEE software engineering body of knowledge: (software engineering knowledge Areas #11-15). 1043-1049 - Penelope DeFreitas:
Undergraduate Research Experiences: A case study from the Computer Science Department, University of Guyana. 1050-1054 - M. Javed, M. Estep:
Teaching Undergraduate Software Engineering: Xamarin Mobile App Development During the Covid-19 Pandemic. 1055-1060 - Fahd H. Almutari, Sung-Chul Hong:
Evaluation of distance learning and students' achievement in Saudi Higher Education Institutions (HEIs). 1061-1065 - Hyeon Jo
:
Effects of Social Distancing Intention, Affective Risk Perception, and Cabin Fever Syndrome on Perceived Value of E-learning : Type of submission: Late Breaking Paper / Most relevant symposium: CSCI-ISED. 1066-1071 - Moh'd A. Radaideh:
Shifting the paradigms from teaching project management to teaching software project management at Jordan university of science and technology based on the IEEE software engineering management knowledge area. 1072-1078 - Joel Weymouth, Ramesh K. Karne, Alexander L. Wijesinha:
A Survey of Innovation in Undergraduate Computer Science Education. 1079-1084 - Gary L. Wallace:
Ethics in Technology: Heroes Assemble! 1085-1090 - Leon Pan:
Designing an Extreme-Based Teaching Model for the First Programming Course. 1091-1094 - George Feuerlicht, Marek Beránek, Vladimír Kovár:
Impact of COVID-19 pandemic on Higher Education. 1095-1098 - Dewan Tanvir Ahmed:
Discovering Effective Learning Methods and Impact of Team-based Programming Projects in Graduate Level Courses. 1099-1102 - Jhasmani Tito
, Tânia Basso, Regina Moraes:
Digital measurement of spatial ability using a Virtual Reality environment. 1103-1107 - Glen Sagers
:
Authentic Assessment in a Beginning Cybersecurity Course: A Pilot Study. 1108-1112 - Namrata Saha, Shabnam Rezapour
, M. Hadi Amini:
Reinforcement Learning - Based Control Systems For Networked Power Infrastructures. 1113-1116 - Lina García-Cabrera
, Irene Pedrosa-García, José-María Serrano:
Posters about Women Pioneers in Computer Science to Break the Gender Gap: A Preliminary Method. 1117-1120 - Maha Al-Yahya, Rana Alkadhi, Hend Alrasheed:
Agile Transformation for Capstone Projects: Preparing Graduates for the Job Market. 1121-1124 - Kristina Kramarczuk, Kate Atchison, Jandelyn D. Plane, Maya Narayanasamy:
The Power of Mentoring Programs in Retaining Women and Black, Indigenous, and Students of Color in Undergraduate Computing Majors. 1125-1128 - Ko Saito, Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:
Estimation of Problematic Portions in Presentation Slides Based on Analysis of Audience's Unconscious Reactions and Slide Data. 1129-1130 - Dong h. Lee, Hwa Jeong Seo, Jinung An, Jong h. Lee:
Design of a new innovative and systematic education program for tech-oriented startups and scaleups leaders. 1131-1132 - Hiroki Wakabayashi, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:
Discussion Visualization Based on Analysis of Comments to Web News. 1133-1134 - Mona Elshinawy, Ginger Scarbrough, Patricia Sullivan:
The Hub of Innovation and Entrepreneurship: Education through Collaboration between University and Industry. 1135-1136 - Bonnie Achée
, Ghassan Alkadi, Matthew McNulty, Sandy Summers:
Industry Connect Initiative: Partnering for Student Success. 1137-1139 - Kathleen Martin, Jimmy Lee, Andrew Kim, Yi Zhao, Shane Walsh, Bahram Shafai:
Myolink: EMG-based Inter-human Wireless Neuroprosthetic Controller. 1140-1145 - Fatemeh Rashidi Fathabadi, Janos L. Grantner, Saad A. Shebrain, Ikhlas Abdel-Qader
:
Surgical Skill Training and Evaluation for a Peg Transfer Task of a Three Camera-Based Laparoscopic Box-Trainer System. 1146-1151 - Arshia Khan, Janna Madden:
Sensor-based System to Algorithmically Recognize Gait Disturbances Common to Vascular Dementia Onset. 1152-1162 - Patrick Philipp, Louisa Hempel, Dirk Hempel, Juergen Beyerer:
Modeling Clinical Practice Guidelines for Interactive Decision Support Exemplified by Primary Myelofibrosis and Immune Thrombocytopenia. 1163-1168 - Ravi Suppiah
, Anurag Sharma, Noori Kim
, Khalid Abidi:
A Novel Event-Related Desynchronization/Synchronization with Gamma Peak EEG model for Motor State Identification. 1169-1175 - Willmer R. Quinones, Ashraf Murtaza, Mun Yong Yi:
Impact of Patch Extraction Variables on Histopathological Imagery Classification Using Convolution Neural Networks. 1176-1181 - Rui Wang, Chwan-Li Shen, Victor S. Sheng, Heng Wu, Zackery Toler, Samuel Temesgen:
A Review of Publicly Patient-Centered Alzheimer's disease datasets. 1182-1188 - Ravi Suppiah
, Khalid Abidi, Noori Kim
, Anurag Sharma:
Motor State Classification based on Electromyography (EMG) Signals using Wavelet Entropy and Neural Networks. 1189-1195 - Ying-Feng Hsu, Morito Matsuoka:
An Early Warning System for Patients in Emergency Department based on Machine Learning. 1196-1201 - Tiago P. De Faria, Marcelo Zanchetta do Nascimento
, Luiz G. A. Martins
:
Understanding the multiclass classification of lymphomas from simple descriptors. 1202-1208 - Alireza Safarzadeh, Mohammad Javad Heidarian, Reza Sharifanfar, Sina Forqandoost Haqiqi, Mohammad Reza Jamali
:
Estimating the Trend of COVID-19 in Iran Before and After the Start of Vaccination. 1209-1216 - Cami Czejdo, Sambit Bhattacharya:
Towards Language Models for AI Mental Health Assistant Design. 1217-1222 - Delia Montero-Contreras, José Luis Quiroz-Fabián
, Adriana Pérez-Espinosa, Rodrigo Rivera-Cerón:
COVIUAM: A mobile app to get information about COVID-19 cases. 1223-1228 - Majed Almazrouei, Murad Al-Rajab:
Automated Indicator of Atrial Fibrillations Risk Using Machine Learning. 1229-1235 - Dan O. Oketch, Topside E. Mathonsi:
Smart Task Reminder Model for People with Mild Dementia at Home. 1236-1240 - Subrata Kumar Das, Mohammad Zahidur Rahman:
Middleware to Integrate Patient Data from Heterogeneous Distributed Databases and Its Efficacy. 1241-1245 - Tian Shi, Longshi Wu, Changhong Zhong, Ruixuan Wang, Hongmei Liu:
Iterative Ensemble Transductive Learning for Microscopy Image Analysis. 1246-1249 - Ashwag Maghraby, Asmaa Numan, Arwa Al Mashi, Asrar Aljuhani, Razan Almehdar, Nada Abdu:
Applied Blockchain Technology in Saudi Arabia Electronic Health Records. 1250-1254 - Xiaoyuan Bao, Jingsi Jiang, Kai Zhang:
Data provenance management and application in Clinical Data Spaces. 1255-1258 - Micah Lessnick, Holger Mauch:
Neural Net Analysis of Peak-Calling Errors in CUT&Tag Data. 1259-1263 - Alireza Ebrahimi:
A User Self-Design Collaborative Web System for Self-directed Health Learning: A Covid-19 Awareness Project. 1264-1267 - Shakour Abuzneid, Miad Faezipour:
Toward Intelligent Respite-Care Dyad Monitoring Using IoT. 1268-1270 - Misagh Faezipour, Miad Faezipour, Brianna Bauman:
Development of a Causal Model to Study the Disparate Effects of COVID-19 on Minorities. 1271-1274 - Meng Jin, Jingsi Jiang, Kai Zhang, Xiaoyuan Bao:
Machine learning and big data based clinical EBM evidence acquisition and evaluation. 1275-1278 - Marius Mølnvik Øye, Bian Yang:
Privacy Modelling in Contact Tracing. 1279-1282 - Dena F. Mujtaba, Nihar R. Mahapatra:
Lateral Flow Test Interpretation with Residual Networks. 1283-1286 - Iyke Maduako, Kwon Ryul Cha:
Decision Making on School Closure Based on Correlation Analysis During COVID-19 Pandemic. 1287-1288 - Marie Bommersheim
, Patrick Philipp:
Supporting the Incorporation of Individual Patient Preferences for Decision Support in Breast Cancer Therapy. 1289-1290 - Jeffrey Wallace, Angelica Valdivia:
A High-Performance 5G/6G Infrastructure for Augmented, Virtual, and Extended Reality. 1291-1296 - Olufemi Fasunlade, Shikun Zhou
, David Sanders
:
Security Threats and Possible Countermeasure In Digital Healthcare. 1297-1302 - Josip Balen, Davor Damjanovic
, Petar Maric, Kresimir Vdovjak:
Optimized Edge, Fog and Cloud Computing Method for Mobile Ad-hoc Networks. 1303-1309 - An-Hui Lo, Justie Su-Tzu Juan:
(n, n) XOR-based visual cryptography schemes with different meaningful shares1. 1310-1316 - Hani Alshahrani, Ali Alshehri
, Abdulrahman Alzahrani, Huirong Fu:
Web-based Malware Detection for Android OS. 1317-1322 - Rinku Sen, Rajib Kumar Das:
Distributed Algorithms for k-Coverage in Mobile Sensor Networks. 1323-1328 - Javier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq
, Wang-Cheol Song:
An ML Based Anomaly Detection System in real-time data streams. 1329-1334 - Hyeon Jo
:
Key Factors Affecting Mobile App Usage Intensity During Isolation: A Cross-National Study : Type of submission: Full research paper / Most relevant symposium: CSCI-ISMC. 1335-1340 - Elie Tagne Fute, Doris-Khöler Nyabeye Pangop, A. L. Ngou Njikam Aziz, Emamnuel Tonyé:
DCLPP: A Distributed and Cooperative approach based on Local Path Planning for Multi-sensors Patrolling - Application to Rapid Bushfire Detection. 1341-1347 - Fatima Belamri, Samra Boulfekhar, Djamil Aïssani
:
ACLSGO: Ant Colony Link State aware Geographic Opportunistic routing protocol for VANET. 1348-1354 - Logan Crandall, Mason Roberts, En Cheng
:
Mimic: A Remote Webcam Device Over WebRTC. 1355-1359 - Glen Sagers
:
WPA3: The Greatest Security Protocol That May Never Be. 1360-1364 - Thubelihle S. Zulu, Topside E. Mathonsi:
An Enhanced VoIP Codec Transcoder to Enhance VoIP Quality for IP Telephone Infrastructure. 1365-1369 - De La Cruz De La Cruz Paola, Rúsbel Domínguez Domínguez
:
Evaluation of the security level of Aruba wireless networks in an educational center. 1370-1376 - Peter Brand, Joachim Falk, Tanja Maier, Jürgen Teich:
Simulating Realistic IoT Network Traffic Using Similarity-based DSE. 1377-1380 - Julián A. Pucheta
, Sergio Laboret, H. Daniel Patiño, Carlos A. Salas, Cristian Rodriguez Rivero
, Martín R. Herrera:
Dynamic model change analysis of social behavior processes during the COVID19 pandemic. 1381-1387 - Marcel S. Stolz:
Platform Neutrality and the Global Balance of Powers. 1388-1394 - Sepideh Banihashemi, Abdolreza Abhari:
Effects of Different Recommendation Algorithms on Structure of Social Networks. 1395-1400 - Shubhangi Rastogi, Shabeg Singh Gill, Divya Bansal:
An Adaptive Approach for Fake News Detection in Social Media: Single vs Cross Domain. 1401-1405 - Matin Pirouz:
Optimized Ranking-Based Community Detection. 1406-1409 - Mizuki Watanabe, Takayuki Fujimoto:
Proposal of an Application for Sharing Daily Ambient Sound. 1410-1414 - Abdou Aziz L. Ngou Njikam
, Elie Fute Tagne:
A Sentiment Analysis Approach for Abusive Content Detection using Improved Dataset. 1415-1420 - Daiyaan Ijaz
, Fady Nissan, Henry Dare, Jonathan Williams, Sean Radatz, William Parker, Sherrene Bogle, Mohammed Mahmoud:
The Impact of Social Media On HCI. 1421-1431 - Jiawei Han, Limin Jiang, Ying Xu, Jingwen Yang, Taotao Sun:
Information Dissemination Model and Trend Forecast of Short Video Social Network. 1432-1436 - Meng-Hsiu Tsai, Nicole Marie Ely, Yingfeng Wang:
Uncertainty Estimation for Twitter Inference. 1437-1440 - Shubhangi Rastogi, Divya Bansal:
Time is Important in Fake News Detection: a short review. 1441-1443 - Portia Buthelezi:
Living, Loving and Learning Online: Raising Awareness of the New Normal and its Security Considerations. 1444-1448 - Junghyun Nam:
Determining the motivations to use Computer-Mediated Communication. 1449-1450 - Massoud Alibakhsh:
System and Methods for Optimal and Synchronized Workflow Based Communication. 1451-1453 - Ronald Chun Yu Lam, L. C. H. Lam, N. X. Li, Peter Kai Kwong Lee:
IoT-based Monitoring System to Prevent Collapse of Falsework Systems During Construction. 1454-1459 - Matteo Anedda
, Mauro Fadda, Massimo Farina, Roberto Girau, Mariella Sole, Daniele D. Giusto:
Safe Social Internet of Thing for Urban Mobility Services. 1460-1464 - Andrew T. Park, Richard Dill, Douglas D. Hodson, Wayne C. Henry:
DDS-Cerberus: Ticketing Performance Experiments and Analysis. 1465-1469 - Ronald Chun Yu Lam, C. K. Tang, K. L. A. Cheung, L. C. H. Lam:
UV-C VentGuard: An IoT-based Monitoring and Disinfection System for Pathogen Inactivation in Ventilation Pipes of High-rise Buildings. 1470-1475 - Matthew Meli, Edward Gatt, Owen Casha, Ivan Grech, Joseph Micallef:
A Novel Modular Low Power and Low Cost IoT Wireless Sensor Node for Air Quality Monitoring. 1476-1481 - C. Alisdair Lee, Shum Paul Kwok-ching, H. Anthony Chan:
A Token Label for Maturity Prediction using Current-Future Changing Rate. 1482-1485 - Peter Jamieson, Santhiya Sampath Kumar, José Augusto Miranda Nacif, Ricardo S. Ferreira:
Analyzing a Low-bit rate Audio Codec - Codec2 - on an FPGA. 1486-1492 - Arata Endo
, Chunghan Lee
, Susumu Date
:
Scalability Evaluation of a Per-User Access Control Framework. 1493-1499 - Ivan Ganchev
, Zhanlin Ji, Máirtín O'Droma:
A Service Tier Design for the EMULSION IoT Platform. 1500-1504 - Uyou Cyou, Shohei Yokoyama, Shingo Otsuka:
Weather Information Acquisition System using Small Wireless Microcomputers and Environmental Sensors for Agricultural Sector. 1505-1510 - Abdoulaye Diallo
, Chérif Diallo:
Human Activity Recognition in Smart Home using Deep Learning Models. 1511-1515 - Farid Ghareh Mohammadi, Farzan Shenavarmasouleh
, Hamid R. Arabnia:
Internet of Things (IoT) in Healthcare: Applications, Challenges and Solutions. 1516-1522 - Abhishek Phadke
, F. Antonio Medrano, Jaimin Brahmbhatt:
A conceptual framework for a Blockchain-based Tax payment financial service. 1523-1527 - Hani Sindi, Rachel McCrindle:
An Internet of Things System with a Social Robot to Reduce the Risk of Hypothermia and Dehydration Occurring in Older Adults. 1528-1533 - Debashish Roy
, Farid Shirazi:
A Review on Multiple Data Source Based Recommendation Systems. 1534-1539 - Ivan Ganchev, Zhanlin Ji, Máirtín O'Droma:
Service Prototype Provisioning for the EMULSION IoT Platform. 1540-1543 - Chinari Takano, Shinya Fujino, Daiki Nobayashi, Kazuya Tsukamoto, Mitsunori Mizumachi, Takeshi Ikenaga:
Development of a Wireless Communication System for Reliable Acoustic Data Collection Toward Anomaly Detection in Mechanical Equipment. 1544-1547 - Brett Glendenning, Riley Kiefer, Ashokkumar Patel:
Ziggurat: A Framework for Providing Scalability and Security in IoT Blockchains. 1548-1550 - Anna Nesvijevskaia, Vincent Martenot, Paul Fogel, Jean-Daniel Zucker:
Identifying actionable customer behavior through advanced analysis of bank transaction data. 1551-1552 - Dena F. Mujtaba, Nihar R. Mahapatra:
Convolutional Neural Networks for Morphologically Similar Fish Species Identification. 1553-1559 - Addisson Salazar
, José Ramón Prieto
, Enrique Vidal, Gonzalo Safont, Luis Vergara:
Fusion of Visual and Textual Features for Table Header Detection in Handwritten Text Images. 1560-1566 - Bruno Padilha, Pedro Losco Takecian, Décio Lauro Soares
, André Luís Schwerz, Leonardo Tadashi Kamaura, João Eduardo Ferreira:
Metricam: Fast and Reliable Social Distancing Analysis in Online Security Cameras. 1567-1573 - Mehran Ghafari
, Daniel Mailman, Hong Qin:
Application Note: μPolar - An Interactive 2D Visualization Tool for Microscopic Time-Series Images. 1574-1581 - Addisson Salazar
, Alberto Rodriguez, Nancy Vargas, Luis Vergara:
Improving classification of composite materials measured by ultrasounds using classifier combination. 1582-1587 - Dena F. Mujtaba, Nihar R. Mahapatra:
Fish Species Classification with Data Augmentation. 1588-1593 - Hieu Le, Hans Walker, Dung N. Tran, Peter Chin:
Corrupting Data to Remove Deceptive Perturbation: Using Preprocessing Method to Improve System Robustness. 1594-1599 - Miguel-Angel Gil-Rios
, Igor Guryev, Juan Manuel Lopez-Hernandez, Iván Cruz-Aceves:
Automatic Classification of Coronary Stenosis using Feature Selection and Boltzmann-Univariate Marginal Distribution Algorithm. 1600-1605 - Jinhua Zhang, Wenkai Guan, Cristinel Ababei, Henry Medeiros
, Richard J. Povinelli:
Speeding-Up the Particle Filter Algorithm for Tracking Multiple Targets Using CUDA Programming. 1606-1610 - Sankarshan Dasgupta, Mehdi R. Zargham:
3D Face Reconstruction from Front and Profile Images for Low Computational Devices. 1611-1616 - Fernando G. Tinetti, Oscar C. Valderrama Riveros:
Combining Technologies for Aiding Search Missions with Drones. 1617-1622 - Mahdi Khosravy, Neeraj Gupta
, Olaf Witkowski, Antoine Pasquali:
Neighborhood Base Matched Morphological Filters: Cross-fertilization with Linear Lowpass Filtering. 1623-1628 - Greg C. Lee, Yu-Che Lee, Cheng-Chieh Chiang:
Low-Resolution Face Recognition in Multi-person Indoor Environments Using Convolutional Neural Networks. 1629-1633 - Aishwarye Omer, Hien Nguyen
:
Determining Performance of Computer Vision Models using Generalizability, Robustness & Elasticity Score. 1634-1638 - Yueyang Wang, Bahram Shafai:
Nonnegative Matrix Factorization Approach for Image Reconstruction. 1639-1642 - Muktiben Mehta, Sung-won Park:
Gain and DC Offset Mismatch Correction in TI-ADC System Using Adaptive Filter. 1643-1647 - Shan-Chien Hsiao, Ching-Te Chiu:
Efficient 2D Keypoint-based Hand Pose Estimation. 1648-1652 - Yingmei Zhang, Hyo Jong Lee:
Multimodal Medical Image Fusion Based on Hybrid Bilateral Filter and Contrast Adjustment Model. 1653-1656 - Kedimotse Baruni, Nthabiseng Mokoena, Mahalingam Veeraragoo, Ross Holder:
Age Invariant Face Recognition Methods: A Review. 1657-1662 - Jiahua Wu, Hyo Jong Lee:
Partial Attention CenterNet for Bottom-Up Human Pose Estimation. 1663-1667 - Ivo R. Draganov, Veska Gancheva
:
Optimal Bilateral Filtering of CT Images. 1668-1672 - Luis Manuel Pereira, Addisson Salazar
, Luis Vergara:
Simultaneous analysis of fMRI and EEG biosignals: a multimodal fusion approach. 1673-1677 - Murtaza Aslam, Fozia Rajbdad, Ömer M. Soysal:
Weight Perception Analysis using Electroencephalographic Signals : Full/regular papers, CSCI-ISPC. 1678-1683 - Addisson Salazar
, Nancy Vargas, Gonzalo Safont, Luis Vergara:
Late Fusion for Improving Intrusion Detection in a Network Traffic Dataset. 1684-1689 - V. Vanitha, S. Pitchumani Angayarkanni
, M. Sathishkumar:
Segmentation of Tuberculosis Bacteria: Evaluation and Comparison. 1690-1696 - Yifeng Tan, Lina Yang, Xichun Li, Zuqiang Meng:
A Fully Convolutional Neural Network Based on 2D-Unet in Cardiac MR Image Segmentation. 1697-1701 - Tiyani Christopher Hlongwane, Topside E. Mathonsi, Deon Du Plessis, Tonderai Muchenje
:
A Review Paper on Facial Recognition Techniques in E-business. 1702-1707 - Lucas Mendes Lima, Victor Calebe Cavalcante, Mariana Guimarães de Sousa, Cláudio Afonso Fleury, Diogo Oliveira, Eduardo Noronha de Andrade Freitas:
Artificial Intelligence in Support of Welfare Monitoring of Dairy Cattle: A Systematic Literature Review. 1708-1715 - Hanrong Wang, Ming Li, Jie Wang, Yang Li, Sidan Du:
A Discussion of Optimization about Stereo Image Depth Estimation Based on Multi-baseline Trinocular Camera Model. 1716-1720 - Chérif Diallo:
An Intelligent System for Detecting People from Images and Videos Provided by IoT Devices. 1721-1727 - Donglin Wang
, Qiang Wu
:
On the Selection of Hyperparameters in Convolutional Neural Networks. 1728-1731 - Cecilia N. Mphahlele, Topside E. Mathonsi:
An Efficient Fingerprint Enhancement Algorithm for Access Control Identification. 1732-1735 - Toshiki Hatano, Taro Kiriyama, Toi Tsuneda, Satoshi Yamane:
Accelerating Model Validation by Reconstructing Image Sets Using GAN. 1736-1739 - Ibidun Christiana Obagbuwa, Kutlo Baldwin Mogorosi, Tshepang Duncan Morapedi:
Image Segmentation and Classification: Alien Plant Detection Using MATLAB. 1740-1743 - Ibidun Christiana Obagbuwa, Stefany Bam, Dineo Tiffany Moroka:
Face Recognition Using MATLAB. 1744-1747 - Sangha Oh, Soon-Yong Park:
High-density 3D reconstruction in a Large space using single camera and 2D LiDAR. 1748-1749 - Sung-Hwan Bae, Chun-Ki Kwon:
Comparison Study of Optimizer on CNN based Finger Number Recognition using sEMG Signals. 1750-1751 - Fang (Cherry) Liu
, Michael D. Weiner
, Kevin Manalo, Aaron Jezghani
, Christopher J. Blanton, Christopher Stone, Kenneth J. Suda, Nuyun Zhang, Dan Zhou, Mehmet Belgin
, Semir Sarajlic, Rubén Lara:
Human-in-the-Loop Automatic Data Migration for a Large Research Computing Data Center. 1752-1758 - Arturo Garza, Claudio A. Parra, Isaac D. Scherson:
Non-Blocking Technique for Parallel Algorithms with Global Barrier Synchronization. 1759-1764 - Federico Rueda, Sonia Lopez Alarcon:
Continuous Variable Quantum Compilation. 1765-1770 - Peter Pirgov, Lenore Mullin, Rishi Khan:
Out-of-GPU FFT: A case study in GPU prefetching. 1771-1776 - M. Hadi Amini, Laurent L. Njilla, Ahmed Imteaj
, Calvin Mark:
Distributed Network Optimization for Secure Operation of Interdependent Complex Networks. 1777-1782 - Eduardo Colmenares, Heng Wu:
Accelerating Workload Processing with MPI for Porter's Stemming Algorithm. 1783-1787 - Veska Gancheva
:
Parallel Multithreaded Medical Images Filtering. 1788-1793 - Amjad Gawanmeh, Wathiq Mansoor, Sa'ed Abed
, Darin Kablaoui, Hala Al-Faisal:
Starvation Avoidance Task Scheduling Algorithm for Heterogeneous Computing Systems. 1794-1799 - Noah W. Scott, Douglas D. Hodson, Richard Dill, Michael R. Grimaila:
Prediction and Convergence Calculations using Rust-based NAlgebra GLM. 1800-1804 - Sakir Yucel:
Hierarchical and Density Aware Spectral Clustering Approach to Server Placement for Collaborative Virtual Services. 1805-1810 - Rashmi Sharma
, Nitin:
Just Network Reorientation In RTDS May Differ the System Efficiency and Accommodativeness. 1811-1816 - Garrett Hentges, Mostafa Abdelrehim:
Odd-Even Flexible Router for High Performance Network-on-Chips. 1817-1820 - Hye-Young Kim, Ji-Hyun Lee:
A load balancing scheme based on deep learning in blockchain network. 1821-1823 - Afnan Albahli, Anneliese Andrews:
Model-Based Testing of Smart Home Systems Using EFSM and CEFSM. 1824-1829 - Iosif Angelidis, Elena Politi
, George Vafeiadis, Danai Vergeti, Dimitris Ntalaperas, Nikos Papageorgopoulos
:
A lightweight Ontology for real time semantic correlation of situation awareness data generated for first responders. 1830-1835 - Ralf Luis de Moura, Débora de Souza Martins, Luciana de Landa Farias Ceotto:
Drowsiness Detection Systems: Comparison and Technical Criteria for Industrial Deployment. 1836-1842 - Teodora Mindra, Gheorghe Florea, Oana Chenaru, Radu Dobrescu, Lucian Toma:
Optimal operation of a microgrid for energy-aware buildings by decision-based algorithm. 1843-1848 - Sangkeum Lee, Hojun Jin, Sarvar Hussain Nengroo
, Dongsoo Har:
P2P Power Trading between Nanogrid Clusters Exploiting Electric Vehicles and Renewable Energy Sources. 1849-1855 - Ilias E. Panagiotopoulos, Konstantina N. Karathanasopoulou, George J. Dimitrakopoulos:
On cognitive management and non-causal reasoning for enabling highly automated driving. 1856-1861 - José Aguilar, Juan Giraldo, Manuela Zapata, Andrés Jaramillo, Luis Zuluaga, María D. R.-Moreno:
Autonomous Cycle of Data Analysis Tasks for Scheduling the Use of Controllable Load Appliances using Renewable Energy. 1862-1867 - Ilias E. Panagiotopoulos, Konstantina N. Karathanasopoulou, George J. Dimitrakopoulos:
Risk Assessment in the Context of Dynamic Reconfiguration of Level of Driving Automation in Highly Automated Vehicles. 1868-1873 - Naif Waheb Rajkhan, Jia Song:
IoT Smart Home Devices' Security, Privacy, and Firmware Labeling System. 1874-1880 - Peyman Akhavan, Lila Rajabion, Maryam Philsoophian
:
The Concept of Resilience in Supply Chain: A Grounded Theory Approach. 1881-1885 - Choong-Hee Han
:
Enhanced cybersecurity for safe smart world. 1886-1890 - João Pedro Cabral, Vitor Gaboardi Dos Santos, Camila Souza, Alison Silva, Abraão Dantas, Nélio Cacho, Frederico Lopes, Daniel Araújo:
An Efficient CNN-based Approach for Automatic Brazilian License Plate Recognition. 1891-1894 - Reinhard Hendricks, Lena Charlotte Altherr
:
An Overview of Selected Autoencoders and Their Potential Application in Smart Cities. 1895-1897 - Yoonsik Cheon, Carlos V. Chavez:
Converting Android Native Apps to Flutter Cross-Platform Apps. 1898-1904 - Lukasz A. Machowski
, Tshilidzi Marwala:
Preservation of Manual Changes and Provenance for Data Quality using the Nano Version Control Repo. 1905-1911 - Zeinab Abdalla, Anneliese Andrews, Ahmed Alhaddad:
Regression Testing of Mobile Apps. 1912-1917 - Ana María Campos Mora, Diego Sánchez Buitrago, Leonardo Juan Ramírez López
:
Crossed analysis of three-variable for early pre-diagnosis of COVID-19. 1918-1923 - Hamad Al Salem, Jia Song:
Grammar-based Fuzzing Tool Using Markov Chain Model to Generate New Fuzzing Inputs. 1924-1930 - Giuseppe A. Di Lucca, Maria Tortorella:
Towards a Framework to compare Blockchain Platforms for Smart Contracts. 1931-1937 - Lukasz A. Machowski
, Tshilidzi Marwala:
Nano Version Control and "Robots of Robots" - Data Driven, Regenerative Production Code. 1938-1943 - Daniset González Lima, Raul Ernesto Gonzalez-Torres, Pedro Mejía-Alvarez:
Automatic Test Cases Generation for C Written Programs Using Model Checking. 1944-1950 - Brendan Tischbein, Caroline Bull, Chris Wiegand, Denisa Gradianu, Elias Qamar, Fabian Isho, Mohammed Mahmoud:
Software Development Methodologies for Virtual Reality. 1951-1957 - Jeff Tian, Abdullah Bokhary, Sultan Alanazy
:
A Comprehensive Framework for Measuring and Improving API Usability. 1958-1963 - Marcel Danilescu, Laura Danilescu
:
Design of software applications using access and actions control policies based on trust. 1964-1968 - Ali Abbiss, Brent Soloniewicz, Cameron Jordan, Chandler Connolly, Chris Wiegand, Corey Dutkiewicz, Mohammed Mahmoud:
Modern HCI for Mobile Applications, Study and Challenges. 1969-1975 - Neha Singh, Palak Patel, Soma Datta:
A survey on security and human-related challenges in agile software deployment. 1976-1982 - Washington Henrique de Carvalho Almeida
, Felipe Furtado, Fernando Escobar
:
A metric for software service outsourcing contracts within the scope of the Brazilian Federal Public Administration. 1983-1988 - Kieran Newell, Kunjal Patel, Magnus Lindén, Michael Demetriou, Michal Huk, Mohammed Mahmoud
:
Evolution of Software Development in the Video Game Industry. 1989-1996 - Tyson Howard, Zizhong John Wang:
Virtual Basketball Training Platform. 1997-2001

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.