CATA 2019: Volume InformationProceedings of 34th International Conference on Computers and Their Applications51 articles•483 pages•Published: March 13, 2019 PapersSession M-A2: Computers in Education: | Tamer Aldwairi 1-7 | Samuel Delaney, Dwight Egbert and Frederick C. Harris Jr 8-16 | Andrew Munoz, Christopher Lewis, Nicholas Bolling, William Zandbergen, Connor Scully-Allison, Vinh Le, Sergiu Dascalu and Benjamin Brown 17-26 | Mohamed Shenify, Hisham Al-Mubaid, Sultan Aljahdali and Abdulaziz Alangari 27-35 | Session M-P1: Computational Issues: | Luka Daoud, Fady Hussein and Nader Rafla 36-44 | Mohammad Hossain and Sameer Abufardeh 45-54 | Thitivatr Patanasakpinyo 55-64 | Ying Jin and Krishna Kaja 65-74 | Session M-P2: Algorithms I: | Ana Maria D'Azevedo Breda and José Manuel Dos Santos Dos Santos 75-82 | Michael Fischer and Jonathan Backens 83-92 | Yijie Han, Mishra Sneha and Md Usman Gani Syed 93-98 | Hussain Albarakati, Reda Ammar and Raafat Elfouly 99-106 | Session M-P3: Computer Security: | Salman Faizi and Shawon Rahman 107-116 | Thomas Le, William Mitchell and Behnam Arad 117-126 | Christopher Chew and Vimal Kumar 127-136 | Tirthankar Ghosh, Eman El-Sheikh and Wasseem Jammal 137-143 | Cheng-Ying Yang, Hsin-Ying Liang and Pin-Yen Huang Huang 144-154 | Session M-P4: Programming and Software Engineering: | Nabil Almashfi and Lunjin Lu 155-167 | Lifeng Liu, Meilin Liu and Chongjun Wang 168-179 | Aakanksha Rastogi and Kendall Nygard 180-190 | Chaney Courtney and Mitchell Neilsen 191-202 | Randy Appleton, Ben Slater, Connor Laitinen, Luke Ammel and Cody Malnor 203-209 | Session T-A2: Computers in Healthcare: | Kasi Periyasamy and Saleh Alsyefi 210-218 | Francisca Fonseca, Hugo Peixoto, Jorge Braga, José Machado and António Abelha 219-224 | Daichi Naito, Ryo Hatano and Hiroyuki Nishiyama 225-235 | Mohammad Owrang Ojaboni, Yasmine Kanaan and Robert Dewitty Jr 236-246 | Session T-P1: Visualization: | Thitivatr Patanasakpinyo, Georgi Batinov, Kofi Whitney, Adel Sulaiman and Les Miller 247-256 | Broday Walker and Tina Johnson 257-264 | Marcos Lopez, Terry Griffin, Kevin Ellis, Anthony Enem and Christopher Duhan 265-270 | Jay Woo, Andrew Frost, Tyler Goffinet, Vinh Le, Connor Scully-Allison, Chase Carthen and Sergiu Dascalu 271-281 | Session T-P2: Algorithms II: | Abdullah Al-Shoshan 282-291 | Antoine Bossard and Keiichi Kaneko 292-300 | Ka Cheok, Kiran Iyengar and Sami Oweis 301-309 | Yusuke Ono, Ryo Hatano, Hayato Ohwada and Hiroyuki Nishiyama 310-316 | Session T-P3: Special Session on Software Engineering Applications: | Ziping Liu and Bidyut Gupta 317-324 | Dustin Ginn, Ilhyun Lee and Haesun Lee 325-335 | Giridhar Maji, Sharmistha Mandal, Narayan Debnath and Soumya Sen 336-344 | Pradeep Kumar Singh, Pijush Kanti Dutta Pramanik, Narayan C. Debnath and Prasenjit Choudhury 345-355 | Session T-P4: Cloud Computing: | Salman Faizi and Shawon Rahman 356-367 | Kasumi Kato, Atsuko Takefusa, Hidemoto Nakada and Masato Oguchi 368-377 | Maryam Alruwaythi, Krishna Kambhampaty and Kendall E. Nygard 378-386 | Mohammed O. Alannsary and Yasser M. Hausawi 387-396 | Kawthar Karkouda, Ahlem Nabli and Faiez Gargouri 397-406 | Session W-A1: Computers in Manufacturing and Business: | Julian Rogers and Hormoz Zareh 407-417 | Roberto Rosas-Romero and Juan-Pablo Medina-Ochoa 418-427 | Takashi Ohnishi, Takashi Okamoto and Keiichi Watanuki 428-437 | Faryar Etesami, Christopher Mullens, Ramsey Sahli and Trey Webb 438-443 | Session W-A2: Applications: | Ana Farhat, Kyle Hagen, Ka C Cheok and Balaji Boominathan 444-453 | Ali Rahim Taleqani, Raj Bridgelall, Jill Hough and Kendall Nygard 454-463 | Henry Okonofua, Shawon Rahman and Reni Ivanova 464-474 | Vasu Saluja, Minni Jain and Prakarsh Yadav 475-483 |
Keyphrases3-D printing, 3D printing, ABS, abstract interpretation, abstract syntax tree, Acceleration data, ACL Authentication, Additive Manufacturing2, Address Verification, Advanced Encryption Standard, AES, agent-based modeling, Agile Methods, Aircraft wing, Android, anomaly detection, Apache Kafka, Apache Spark, application development, Architecture, archive, artificial financial predictors, back-stepping control, behavior, Behaviour, behaviour-based detection, Biological Software, Botnet Detection, breast cancer, CANFIS, CDR, Chinese, CIS relationship with other computing disciplines, Cloud2, Cloud Computing3, Cloud Security2, Cloud Service Provider Selection, Clustering, code, Cognitive Radio Networks, collaborative, Command Line Interface, communication, compiler, Complexity., Composite, Computation Tree Logic, computational biology, Computer Information Systems curriculum, Computer Networks, Computer Science Education, conflict resolution, Contamination, cooperative communication, CTA mapping, Cyber Security, Cybersecurity, Data Communications, Data Encryption, Data Mining, Data Security, Data Warehouse, database, database audit, deadlock, deadlock detection, Delivery Model, demand, Design, Design Science, distance measure, distributed stream processing, Domain Generation Algorithm, driving, Drowsy, Dynamic Spectrum Access, e-commerce, EEG, Electronic Brake System (EBS), Electronic Maternity Records, emergency, ethnicity, eXtensible Access Control Markup Language, facial expressions, FDM, File Entropy, File Monitoring, filtering, financial time series, finite element analysis, FPGA., Framework security, Genius, GeoGebra., GIS, Global Position Data, glyph, GPGPU, Graph Database System, Healthcare social network, Hidden Markov Models, High-Level Synthesis, HLS, HTC Vive, HTTP/2.0, Human Computer Interaction, Human Computer Interaction (HCI), image processing, incident tracking, Inductive Logic Programming, Information Extraction, information representation, Information Security Risk Management, Injection molding, Integrated Development Environment, Integrity, intelligent parking, Intelligent Transportation Systems, Intrusion Detection, IoT, IS risk, IT leadership, JavaScript, K-means clustering, kanji, kinematics, leader-follower platoon, Leadership Style, locomotion, logogram, Lyapunov stability, Lyrics Database, machine learning3, magnet, malware detection, mHealth, Minkowski distance, mobile development, model checking, Multi Layer Perceptron, Multipath., music recommendation, musicology, MusiXmatch, Natural Language Processing, NetLogo, network, Network Security, neuro-fuzzy based identification, non-stationary signal, null pointer exception, octagon domain, Optimization, Oracle® database, parallel algorithms, parking lot occupancy, Personal Health Records, personalized recommendation, physical layer security, polyhedron model, prediction, Prediction of Event, prefecthing web requests, Prefetching, Privacy, Process-Resource Graph, prognosis, Progressive Web Apps, projectile motion, pTree., Ransomware, Rapid Tooling, Raspberry Pi, ray, real-time, Real-Time Constraints, Recommendation Systems, Regression, relay assignment, removal, Rendezvous Algorithm, reporting, Reputation, Resource Allocation Graph, reuse, risk management, road impact factor, road quality, route planning, RStudio, Saudi Arabia, secrecy capacity, Security5, self-driving vehicle, Sentiment Analysis, similarity, SLA, Smooth path planning, software development lifecycle, software functionality, software porting, software requirements, software security, Software Specifications, sort real numbers, sorting, spatial ability, spatial visualization, spherical geometry, Spherical Tilings, square Euclidean distance, static analysis, survival analysis, TDARMA modeling, Telecom Data Mining, tiered architecture, time-frequency distribution, Time variance, Top-n Neighbor, transactional leadership, transformational leadership, triple negative breast cancer, Trust, trust evaluation, Trusted Cloud, TV coefficients, Underwater Acoustic Sensor Networks, Underwater embedded system, user interface2, user similarity, verification, vertical processing, Virtual Reality, Virtual Reality (VR), Vision 2030, web development. |
|