CATA2022: Volume InformationProceedings of 37th International Conference on Computers and Their Applications16 articles•159 pages•Published: March 18, 2022 PapersNarayan C. Debnath, Shreya Banerjee, Giau Ung Van, Phat Tat Quang and Dai Nguyen Thanh 1-10 | Thitivatr Patanasakpinyo, Natcha Chen, Natthikarn Singsornsri and Nattapach Kanchanaporn 11-20 | Md Jakir Hossain Molla, Md Obaidullah Sk, Parveen Ahmed Alam, Narayan Debnath and Soumya Sen 21-31 | Madhu Kumari, Sugyan Kumar Mishra, Narayan C. Debnath and Anirban Sarkar 32-41 | Hongkai Chen and Mohammad Hossain 42-52 | Bradford Towle Jr. and Gabrielle Tristani 53-62 | Logan Day, Tirthankar Ghosh, Sikha Bagui and Subhash Bagui 63-71 | Sruthi Rachamalla and Henry Hexmoor 72-81 | Ayushi Vadwala and Ying Jin 82-91 | Melissa Schneider, Md Minhaz Chowdhury and Shadman Latif 92-101 | Logan Smith, Md Minhaz Chowdhury and Shadman Latif 102-111 | Ian Macedo Maiwald Santos, Luciana de Oliveira Rech and Ricardo Moraes 112-121 | Luka Daoud and Hingkwan Huen 122-130 | Namuunbadralt Zolboot, Quinn Johnson, Dakun Shen and Alexander Redei 131-140 | Christopher Lewis, Sven Diaz-Juarez, Steven Anbro, Alison Szarko, Ramona Houmanfar, Laura Crosswell, Michelle Rebaleati, Luka Starmer and Frederick Harris 141-149 | Aishwarya Gouru and Shan Suthaharan 150-159 |
Keyphrases360 video, active database system, AI, Apps, AR, Artificial Intelligence, Artificial Neural Network, Augmented Reality, Augmented Reality Requirements, B+ tree, Black Hat, Blockchain, CDSS, Chronological Survey, Coverage area, cryptomining, Driver Safety, Emotion Detection, Emotional frequencies, End-User Development, Entropy Analysis, Ethical Hacking, eye tracking, Fourier transform, Fuzzy Logic, geolocation, Graph Database System, Grey Hat, Hearthstone Battleground Simulator, HMD, Industrial Control System Security, Internet of Things, IoT2, iRobot, JSON Schema, Keyloggers, KPIO, lattice, Location-based Study, machine learning2, Madware, Malware, medical simulation, MIPS, Modbus over TCP/IP, Monte Carlo Tree Search, neural network, NVMe, Ontology, performance evaluation, porting, Process Store (PS), Random Forest, Recruitment, Redundant Area, Rewarding driving, Robot Vacuum, searching algorithm, Self-Encrypting Drive, service model, short text, smart contracts, social media, Software-based encryption, Software Quality Assurance and Testing, Support Vector Machine, text mining, topic modeling, Trigger-Action Programming, Trojan, VR, White Hat. |
|