


default search action
SAI 2021: Virtual Event
- Kohei Arai:

Intelligent Computing - Proceedings of the 2021 Computing Conference, Volume 3, SAI 2021, Virtual Event, 15-16 July, 2021. Lecture Notes in Networks and Systems 285, Springer 2021, ISBN 978-3-030-80128-1 - Marisol Roldán-Palacios, Aurelio López-López:

Feature Analysis for Aphasic or Abnormal Language Caused by Injury. 1-16 - Odai S. Salman, Ran Klein:

Automatic Detection and Segmentation of Liver Tumors in Computed Tomography Images: Methods and Limitations. 17-35 - Reem Alwashmi

, Nesreen Alharbi, Aliaa M. Alabdali, Arwa A. Mashat:
HEMAYAH: A Proposed Mobile Application System for Tracking and Preventing COVID-19 Outbreaks in Saudi Arabia. 36-47 - Igor Godefroy Kouam Kamdem, Marcellin Julius Antonio Nkenlifack

:
Data Security in Health Systems: Case of Cameroon. 48-57 - Dalia Attas

, Bahman Mirheidari, Daniel Blackburn
, Annalena Venneri, Traci Walker
, Kirsty Harkness, Markus Reuber, Chris Blackmore, Heidi Christensen
:
Predicting Levels of Depression and Anxiety in People with Neurodegenerative Memory Complaints Presenting with Confounding Symptoms. 58-69 - Konstantin Kalinin, Yuriy Mironenko, Mikhail Kopeliovich, Mikhail Petrushan:

Towards Collecting Big Data for Remote Photoplethysmography. 70-86 - Safa Meraghni, Khaled Benaggoune, Zeina Al Masry, Labib Sadek Terrissa, Christine Devalland, Noureddine Zerhouni:

Towards Digital Twins Driven Breast Cancer Detection. 87-99 - Samuel Ofosu Mensah, Bubacarr Bah

, Willie Brink
:
Towards the Localisation of Lesions in Diabetic Retinopathy. 100-107 - Sarang Chaudhari, Michael Clear, Philip Bradish, Hitesh Tewari

:
Framework for a DLT Based COVID-19 Passport. 108-123 - Daqing Chen

, Laureta Hajderanj, Sarah Mallet, Pierre Camenen, Bo Li, Hao Ren, Erlong Zhao:
Deep Learning Causal Attributions of Breast Cancer. 124-135 - Alicja Smolikowska, Pawel Kaminski

, Rafal Obuchowicz
, Adam Piórkowski
:
Effect of Adaptive Histogram Equalization of Orthopedic Radiograph Images on the Accuracy of Implant Delineation Using Active Contours. 136-144 - Aya Mohamed Morsy, Mostafa Abdel Azim Mostafa:

Identification Diseases Using Apriori Algorithm on DevOps. 145-160 - Signe Marie Cleveland, Moutaz Haddara

:
IoT for Diabetics: A User Perspective. 161-172 - Majed Alkhusaili

, Kalim Qureshi:
Case Study: UML Framework of Obesity Control Health Information System. 173-191 - Sarah A. McHale

, Ella Pereira:
An IoT Based Epilepsy Monitoring Model. 192-207 - Esther Pearson:

Biostatistics in Biomedicine and Informatics. 208-212 - Alexander Kozlov, Ivan Lazarevich, Vasily Shamporov, Nikolay Lyalyushkin, Yury Gorbachev:

Neural Network Compression Framework for Fast Model Inference. 213-232 - Tihomir Taskov, Juliana Dushanova

:
Small-World Propensity in Developmental Dyslexia After Visual Training Intervention. 233-258 - Hossein Bonakdari, Azadeh Gholami, Bahram Gharabaghi, Isa Ebtehaj, Ali Akbar Akhtari:

An Assessment of Extreme Learning Machine Model for Estimation of Flow Variables in Curved Irrigation Channels. 259-269 - Stanislav Selitskiy

, Nikolaos Christou, Natalya Selitskaya:
Benchmarking of Fully Connected and Convolutional Neural Networks on Face Recognition: Case of Makeup and Occlusions. 270-285 - Yaqing Luo:

Wavelet Neural Network Model with Time-Frequency Analysis for Accurate Share Prices Prediction. 286-297 - Vasco Lopes, Paulo A. P. Fazendeiro

:
A Hybrid Method for Training Convolutional Neural Networks. 298-308 - Jim Q. Chen:

A Layered Framework for Dealing with Dilemmas in Artificial Intelligence Systems. 309-326 - Ryan M. Gibson, Gordon Morison:

Improving Student Engagement and Active Learning with Embedded Automated Self-assessment Quizzes: Case Study in Computer System Architecture Design. 327-339 - Maryna Popova

, Rina Novogrudska:
Cognitive Load of Ontology as a Means of Information Representation in the Educational Process. 340-352 - Dalibor Peic, Andrija Bernik

:
The Influence of Computer Games on High School Students (Adolescents). 353-368 - Ashok Kumar Veerasamy, Peter Larsson, Mikko-Ville Apiola, Daryl J. D'Souza, Mikko-Jussi Laakso:

Pedagogical Approaches in Computational Thinking-Integrated STEAM Learning Settings: A Literature Review. 369-389 - Alex J. Deakyne, Thomas Valenzuela, Paul A. Iaizzo:

Development of Anaglyph 3D Functionality for Cost-Effective Virtual Reality Anatomical Education. 390-398 - Monica Maiti

, M. Priyaadharshini, B. Vinayaga Sundaram:
Augmented Reality in Virtual Classroom for Higher Education During COVID-19 Pandemic. 399-418 - Levis Zerpa:

The Teaching and Learning of the Untyped Lambda Calculus Through Web-Based e-Learning Tools. 419-436 - Askar Boranbayev, Ruslan Baidyussenov, Mikhail Mazhitov:

Development and Design of a Library Information System Intended for Automation of Processes in Higher Education Institution. 437-445 - Darron Lamkin, Robin Ghosh, Tutaleni I. Asino, Tor A. Kwembe:

Informally Teaching Black Youth STEM Concepts Virtually Using Artificial Intelligence and Machine Learning. 446-461 - Osama A. Marzouk

:
Accrediting Artificial Intelligence Programs from the Omani and the International ABET Perspectives. 462-474 - Susana Sanchez:

Embodied Learning: Capitalizing on Predictive Processing. 475-490 - Tobias Nyström

:
Exploring the Darkness of Gamification: You Want It Darker? 491-506 - Dalize van Heerden

, Leila Goosen
:
The Future of Information and Communication Technology Courses. 507-526 - Dolores Kamenar Cokor, Andrija Bernik

:
The Impact of Computer Games on Preschool Children's Cognitive Skills. 527-541 - Manuel Rodrigues

:
Using STEM to Improve Computer Programming Teaching. 542-548 - Richard Halstead-Nussloch, Rebecca H. Rutherfoord:

Tips for Using Open Educational Resources to Reduce Textbook Costs in Computing and IT Courses. 549-559 - Meina Tawaki, Keiko Yamamoto, Ichi Kanaya:

Cross-Cultural Design of Simplified Facial Expressions. 560-574 - Emmanouil Koulas

, Marios Anthopoulos, Sotiria Grammenou, Christos Kaimakamis, Konstantinos Kousaris, Fotini-Rafailia Panavou, Orestis Piskioulis, Syed Iftikhar Hussain Shah, Vassilios Peristeras
:
Misinformation and Its Stakeholders in Europe: A Web-Based Analysis. 575-594 - Bianca Tonino-Heiden

, Bernhard Heiden
, Volodymyr Alieksieiev
:
Artificial Life: Investigations About a Universal Osmotic Paradigm (UOP). 595-605 - Josiah Eleazar T. Regencia, William Emmanuel S. Yu:

Latency and Throughput Advantage of Leaf-Enforced Quality of Service in Software-Defined Networking for Large Traffic Flows. 606-623 - Mui Joo Tang, Eang Teng Chan:

The Impact of Online Social Networking (Social Media) on Interpersonal Communication and Relationships. 624-640 - Andrés Rico, Carson Smuts, Jason Nawyn, Kent Larson:

Embedded Piezoelectric Array for Measuring Relative Distributed Forces on Snow Skis. 641-648 - Samirah A. Alhusayni, Shuruq K. Alsuwat, Shahd H. Altalhi

, Faris A. Almalki, Hawwaa S. Alzahrani:
Experimental Study of a Tethered Balloon Using 5G Antenna to Enhance Internet Connectivity. 649-663 - Rui Pinto

, Gil Gonçalves
, Jerker Delsing, Eduardo Tovar
:
Incremental Dendritic Cell Algorithm for Intrusion Detection in Cyber-Physical Production Systems. 664-680 - Emanuele Bellini, Matteo Rossi:

Performance Comparison Between Deep Learning-Based and Conventional Cryptographic Distinguishers. 681-701 - Jakub Klemsa:

TFHE Parameter Setup for Effective and Error-Free Neural Network Prediction on Encrypted Data. 702-721 - Efthimios-Enias Gojka

, Niclas Kannengießer
, Benjamin Sturm, Jan Bartsch, Ali Sunyaev:
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors. 722-742 - Ahmad Ghafarian, Darius Fiallo:

An Analysis of Twitter Security and Privacy Using Memory Forensics. 743-760 - Souhaïl El Ghazi El Houssaïni, Ilham Maskani, Jaouad Boutahar:

A Security Requirement Engineering Case Study: Challenges and Lessons Learned. 761-783 - Romas Vijeikis, Vidas Raudonis, Gintaras Dervinis

:
Towards Automated Surveillance: A Review of Intelligent Video Surveillance. 784-803 - Juan Moreno, Sebastián Quintero, Alvaro Riascos, Luis Gustavo Nonato, Cristian Sánchez:

Homicide Prediction Using Sequential Features from Graph Signal Processing. 804-817 - Alessandro Annarelli, Serena Clemente, Fabio Nonino

, Giulia Palombi
:
Effectiveness and Adoption of NIST Managerial Practices for Cyber Resilience in Italy. 818-832 - Hector Caballero-Hernandez, Vianney Muñoz-Jiménez, Marco A. Ramos:

Steganographic Method to Data Hiding in RGB Images Using Pixels Redistribution Combining Fractal-Based Coding and DWT. 833-850 - Ahmad Whafa Azka Al Azkiyai, Ari Moesriami Barmawi, Bambang Ari Wahyudi

:
Improving the Imperceptibility of Pixel Value Difference and LSB Substitution Based Steganography Using Modulo Encoding. 851-867 - Ammar S. Salman, Wenliang (Kevin) Du:

Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework. 868-884 - Milena Gjorgjievska Perusheska, Vesna Dimitrova, Aleksandra Popovska-Mitrovikj

, Stefan Andonov
:
Application of Machine Learning in Cryptanalysis Concerning Algorithms from Symmetric Cryptography. 885-903 - Christopher Robert Philabaum, Christopher Coffey, Bertrand Cambou, Michael Gowanlock:

A Response-Based Cryptography Engine in Distributed-Memory. 904-922 - Daniele Di Tullio, Manoj Gyawali

:
Elliptic Curves of Nearly Prime Order. 923-932 - Glenn Papp, Petter Lovaas:

Assessing Small Institutions' Cyber Security Awareness Using Human Aspects of Information Security Questionnaire (HAIS-Q). 933-948 - Evercita C. Eugenio, Fang Liu:

Construction of Differentially Private Empirical Distributions from a Low-Order Marginals Set Through Solving Linear Equations with l2 Regularization. 949-966 - Shizra Sultan, Christian Damsgaard Jensen:

Secondary Use Prevention in Large-Scale Data Lakes. 967-985 - Mohamed Chawki

:
Cybercrime in the Context of COVID-19. 986-1002 - Federico Palmaro, Luisa Franchina:

Beware of Unknown Areas to Notify Adversaries: Detecting Dynamic Binary Instrumentation Runtimes with Low-Level Memory Scanning. 1003-1019 - Bertrand Cambou, Ying-Chen Chen:

Tamper Sensitive Ternary ReRAM-Based PUFs. 1020-1040 - Denise Dragos, Suzanna Schmeelk:

Locating the Perpetrator: Industry Perspectives of Cellebrite Education and Roles of GIS Data in Cybersecurity and Digital Forensics. 1041-1050 - Ivaylo Chenchev

, Adelina Aleksieva-Petrova, Milen Petrov
:
Authentication Mechanisms and Classification: A Literature Survey. 1051-1070 - Kavinga Yapa Abeywardena

, A. M. I. S. Abeykoon, A. M. S. P. B. Atapattu, H. N. Jayawardhane, C. N. Samarasekara:
ARCSECURE: Centralized Hub for Securing a Network of IoT Devices. 1071-1082 - Christoforos Nalmpantis, Lazaros Vrysis, Danai Vlachava, Lefteris Papageorgiou, Dimitris Vrakas:

Entropy Based Feature Pooling in Speech Command Classification. 1083-1091

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














