


default search action
4th ICICT 2019: London, UK
- Xin-She Yang, R. Simon Sherratt, Nilanjan Dey, Amit Joshi:
Fourth International Congress on Information and Communication Technology - ICICT 2019, London, UK, February 25-26, 2019, Volume 2. Advances in Intelligent Systems and Computing 1027, Springer 2020, ISBN 978-981-32-9342-7 - Youna Jung:
PESOHA: Privacy-Preserving Evaluation System for Online Healthcare Applications. 1-15 - Rita Yi Man Li, Tat Ho Leung:
Computer Vision and Hybrid Reality for Construction Safety Risks: A Pilot Study. 17-22 - Oussama Ghorbel, Hamoud H. Alshammari
, Mohammed Aseeri, Radhia Khdhir, Mohamed Abid:
Data Reduction Using NMF for Outlier Detection Method in Wireless Sensor Networks. 23-30 - Ezekiel Uzor Okike
, Seamogano Mosanako:
Measuring Customer Satisfaction on Software-Based Products and Services: A Requirements Engineering Perspective. 31-45 - Thai Minh Truong
, Cuong Huy Phan
, Hoang Van Tran
, Long Nhut Duong
, Linh Van Nguyen
, Toan Thanh Ha
:
To Develop a Water Quality Monitoring System for Aquaculture Areas Based on Agent Model. 47-58 - Muhammad Arslan
, Christophe Cruz
, Dominique Ginhac
:
Identifying Intrusions in Dynamic Environments Using Semantic Trajectories and BIM for Worker Safety. 59-67 - Karina A. Gulyaeva
, Irina L. Artemieva:
The Ontological Approach in Organic Chemistry Intelligent System Development. 69-78 - Komal Teja Mattupalli, Sriraman Kothuri
:
Effective Way of Deriving the Context from a Handwritten Image/Object. 79-88 - Liudmila Babenko
, Ilya Pisarev
:
E-Voting System Based on Multiple Ballot Casting. 89-97 - Yong Fang
, Yijia Xu
, Cheng Huang, Liang Liu, Lei Zhang:
Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest. 99-115 - Stefan Marksteiner
, Bernhard Jandl-Scherf
, Harald Lernbeiß
:
Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques. 117-127 - Manon Lisa Sijm, Chelsea Rome Exel, Jan Treur
:
Using a Temporal-Causal Network Model for Computational Analysis of the Effect of Social Media Influencers on the Worldwide Interest in Veganism. 129-140 - Ann Nosseir
, Ahmed Hamad
, Abdelrahman Wahdan:
Detecting Drivers' Fatigue in Different Conditions Using Real-Time Non-intrusive System. 141-151 - Craig S. Wright:
Decentralized Autonomous Corporations. 153-167 - Craig S. Wright:
A Distribution Protocol for Dealerless Secret Distribution. 169-191 - Ahmed M. Mahfouz, Deepak Venugopal, Sajjan G. Shiva:
Comparative Analysis of ML Classifiers for Network Intrusion Detection. 193-207 - Neha Sathe
, Anil Hiwale
:
Achieving Wellness by Monitoring the Gait Pattern with Behavioral Intervention for Lifestyle Diseases. 209-218 - Hendrik von Kentzinsky, Stefan Wijtsma, Jan Treur
:
A Temporal-Causal Modelling Approach to Analyse the Dynamics of Burnout and the Effects of Sleep. 219-232 - Pieke Heijmans, Jip van Stijn, Jan Treur
:
Modeling Cultural Segregation of the Queer Community Through an Adaptive Social Network Model. 233-248 - David Bird
:
Derivation of a Conceptual Framework to Assess and Mitigate Identified Customer Cybersecurity Risks by Utilizing the Public Cloud. 249-265 - Hussain Al-Aqrabi
, Richard Hill
, Phil Lane, Hamza Aagela:
Securing Manufacturing Intelligence for the Industrial Internet of Things. 267-282 - Kaisa Lõhmus, Katrin Nyman-Metcalf
, Rozha K. Ahmed
, Ingrid Pappel
, Dirk Draheim:
The Private Sector's Role in e-Government from a Legal Perspective. 283-298 - Thierry Roger Bayala, Sadouanouan Malo
, Atsushi Togashi:
Toward an Effective Identification of Tweet Related to Meningitis Based on Supervised Machine Learning. 299-306 - Nhlakanipho C. Fakude, Ayoturi Tosin Akinola, Matthew Olusegun Adigun
:
The Effect of Data Transmission and Storage Security Between Device-Cloudlet Communication. 307-319 - Elton Shah Aly, Dustin Terence van der Haar:
Slang-Based Text Sentiment Analysis in Instagram. 321-329 - Ilse Lelieveld
, Gert-Jan Storre, Seyed Sahand Mohammadi Ziabari
:
A Temporal Cognitive Model of the Influence of Methylphenidate (Ritalin) on Test Anxiety. 331-345 - Sung-Jong Eun, Eun-Young Jung, Hyun Ki Hong, Dong-Kyun Park:
Stroke Diagnosis Algorithm Based on Similarity Analysis. 347-352 - Francesco Colace, Massimo De Santo, Marco Lombardi, Francesco Pascale, Domenico Santaniello, Allan Tucker:
A Multilevel Graph Approach for Predicting Bicycle Usage in London Area. 353-362 - Abdelhak Belhi, Houssem Gasmi, Abdelaziz Bouras, Taha Alfaqheri, Akuha Solomon Aondoakaa, Abdul Hamid Sadka, Sebti Foufou:
Machine Learning and Digital Heritage: The CEPROQHA Project Perspective. 363-374 - George Papageorgiou, Eudokia Balamou, Athanasios Maimaris
:
Developing a Business Model for a Smart Pedestrian Network Application. 375-381 - Santosh Kedari, Jaya Shankar Vuppalapati, Anitha Ilapakurti, Sharat Kedari, Rajasekar Vuppalapati, Chandrasekar Vuppalapati:
The Role of Supervised Climate Data Models and Dairy IoT Edge Devices in Democratizing Artificial Intelligence to Small Scale Dairy Farmers Worldwide. 383-404 - Swapnika Reddy Putta, Abdullah Abuhussein, Faisal Alsubaei
, Sajjan G. Shiva, Saleh Atiewi
:
Security Benchmarks for Wearable Medical Things: Stakeholders-Centric Approach. 405-418 - Chandrashekhar Pantina, Prabhakaran Malini, Georg Gutjahr, Raghu Raman
, Prema Nedungadi
:
Teacher Perception of OLabs Pedagogy. 419-426 - Mithun Haridas
, Nirmala Vasudevan, Georg Gutjahr, Raghu Raman
, Prema Nedungadi
:
Comparing English and Malayalam Spelling Errors of Children using a Bilingual Screening Tool. 427-436 - Ganeshayya Ishwarayya Shidaganti, S. Prakash, K. G. Srinivasa
:
Curriculum Enrichment in Empowering "Corporate-Ready" Individuals. 437-447 - Segundo Moisés Toapanta Toapanta
, Felix Gustavo Mendoza Quimi
, Rubén Franklin Reina Salazar
, Luis Enrique Mafla Gallegos
:
Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City. 449-461 - Segundo Moisés Toapanta Toapanta
, Johan Eduardo Aguilar Piguave
, Luis Enrique Mafla Gallegos
:
Analysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador. 463-473 - Sanjay Gaur
, Darshanaben D. Pandya, Manish Kumar Sharma:
Applied N F Interpolation Method for Recover Randomly Missing Values in Data Mining. 475-485 - Sanjay Gaur
, Hemant Sahu, Kulvinder Singh
:
ICT-Enabled Business Promotion Approach Through Search Engine Optimization. 487-495 - Wafa Waheeda Syed, Somaya Al-Máadeed
:
Infrared Versus Visible Image Matching for Multispectral Face Recognition. 497-507 - Drishty Sobnath
, Olufemi Isiaq, Ikram Ur Rehman
, Moustafa M. Nasralla
:
Using Machine Learning Advances to Unravel Patterns in Subject Areas and Performances of University Students with Special Educational Needs and Disabilities (MALSEND): A Conceptual Approach. 509-517 - Karim Hammoudi
, Mohammed AbuTaha, Halim Benhabiles
, Mahmoud Melkemi, Féryal Windal, Safwan El Assad, Audrey Queudet:
Image-Based Ciphering of Video Streams and Object Recognition for Urban and Vehicular Surveillance Services. 519-527 - Suparna Dutta, Niket Mehta
:
Augmented Reality - A Tool for Mediated Communication: A Case Study of Teen Pregnancy in Contexts like India. 529-536

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.