CATA 2020: Volume InformationProceedings of 35th International Conference on Computers and Their Applications41 articles•402 pages•Published: March 9, 2020 PapersSession MA2: Visualization and Image Processing | Conor Carroll, Nupur Garg, Theresa Migler, Barbara Walker and Zoë Wood 1-12 | Alexander Novotny, Rowan Gudmundsson and Frederick Harris 13-21 | Thitivatr Patanasakpinyo and Les Miller 22-31 | Andrew Muñoz, Frederick Harris and Sergiu Dascalu 32-39 | Session MP1: Cybersecurity, Threat Analytics and Internet Censorship Issues | Nick Rahimi, Jordan Maynor and Bidyut Gupta 40-47 | Aakanksha Rastogi and Kendall Nygard 48-59 | Nick Rahimi and Bidyut Gupta 60-68 | Mostofa Ahsan and Kendall Nygard 69-79 | Session MP2: Computing in Business and Urban Planning | Naai-Jung Shih, Cheng-Yu Hsieh, Yi Chen and Pei-Huang Diao 80-89 | Laurie Butgereit 90-97 | Hamza Abdelmalek, Gino Chénard, Ismaïl Khriss and Abdeslam Jakimi 98-111 | Narayan Debnath, Mario Gabriel Peralta, Carlos Humberto Salgado, Luis Roque, Daniel Riesco, Germán Montejano and Mouna Mazzi 112-121 | Session MP3: Database Management and Operating Systems | Ramblin Cherniak, Qiang Zhu and Sakti Pramanik 122-133 | Ying Jin, Vadlamannati Bharath and Jinaliben Shah 134-140 | Waleed Almutairi and Ryszard Janicki 141-150 | Navid Ordouie, Rasha Almajed, Ramesh Karne, Alexander Wijesinha, Joel Weymouth and Nirmala Soundararajan 151-160 | Session MP4: Algorithms and Methods in Computing | Maher Selim, Ryan Zhou, Wenying Feng and Omar Alam 161-169 | N Sutta, Z Liu and X Zhang 170-179 | Toshiyuki Haruhara, Hideto Ohgi, Masaaki Suzuki, Hiroyuki Takao, Takashi Suzuki, Soichiro Fujimura, Toshihiro Ishibashi, Makoto Yamamoto, Yuichi Murayama and Hayato Ohwada 180-186 | Hui Guo and Qin Ding 187-196 | Jacob Sukhodolsky 197-205 | Session TA2: Neural Networks | Jong Hyun Lee, Hyun Sil Kim and In Soo Lee 206-213 | Alaa Sheta, Hamza Turabieh, Sultan Aljahdali and Abdulaziz Alangari 214-223 | Hoang Son Nguyen, Yu Takahata, Masaaki Goto, Tetsuo Tanaka, Akihiko Ohsuga and Kazunori Matsumoto 224-229 | Mason Chen and Charles Chen 230-241 | Session TP2: Software Engineering Applications | Runa Ganguli, Akash Mehta, Narayan Debnath, Sultan Aljahdali and Soumya Sen 242-255 | Alexander Iliev and Peter Stanchev 256-263 | Avick Kumar Dey, Bibek Poddar, Pijush Kanti Dutta Pramanik, Narayan C Debnath, Sultan Aljahdali and Prasenjit Choudhury 264-276 | Cuauhtemoc Lopez-Martin 277-286 | Session TP3: Computing Applications | Takashi Ohnishi and Keiichi Watanuki 287-296 | Garrett Hope, Paul Brodhead and Seung-yun Kim 297-306 | Huda Aldosari, Raafat Elfouly, Reda Ammar and Mohammad Alsulami 307-316 | Paul Brodhead, Garrett Hope and Seung-yun Kim 317-326 | Session WA1: Performance Issues in Computing | Lamyaa Al-Omairi, Jemal Abawajy and Morshed Chowdhury 327-333 | Deok Nam 334-344 | Said El-Khamy and Dalia Ibrahim 345-354 | Ramin Sharifi, Pouya Shiri and Amirali Baniasadi 355-361 | Session WA2: Enhancing the Human Condition through Computing | Izzat Alsmadi, Zaid Almubaid and Hisham Al-Mubaid 362-371 | Haider Kassem, Morshed Chowdhury, Jemal Abawajy and Ahmed Al-Sudani 372-382 | Paul Cappaert and Alex Redei 383-392 | Nabila Mansouri, Hana Bougueddima and Yousra Ben Jemaa 393-402 |
Keyphrases3D reconstruction, 3DHOG, Active Rule, adaptive system, Address Verification, Advanced Driver Assistance Systems, Age estimation, algorithm, ANSYS, Anti-Censorship, Architecture-Driven Modernization, Artificial Intelligence2, Assignment, Bare Machine Computing, bare PC, Binary Transformation Methodology, Biometrics, block, Business Intelligence, Capsule Networks, censorship, cerebral aneurysm, Channel-matched, cheating, Classification2, classification algorithms, Classifier, clinical data, cluster, Clustering, CNN, code analysis, Cognitive score, collaboration, Computational Fluid Dynamics, Concentration degree, Convolutional Neural Network, Convolutional Neural Networks, course, cultural heritage, cultural tourism, Cybersecurity, data analysis, Data Mining/Knowledge Discovery, database, Definitive Screening Design, dense substructure, density-based clustering, depth map, Dimension reduction techniques, Disease monitoring and surveillance, Disease outbreak detection, Django application, Driver Yawning, Drivers Fatigue, EEG signal, email spam, Emotions, Energy Forecasting, environmental data, ethics, Evasion Attack, execution environment, facial detection, Facial Landmark Detection, Fatigue Prediction, foreign metal removal, Friend suggestion, Fuzzy Petri nets, Geohash, Geometry computing, GIS, Google Trends, graph, Graph Database System, Graph Dimensionality reduction, graph theory, graphics, Handwriting Recognition, Hemodynamic Data, hierarchical clustering, homework, Human-Computer Visualization, image processing, image semantics, imbalance data, indicators, informal sector, Inspection, interactive exhibit, Internet, Intrusion Detection, IoT, JMP, Kinect, learner classification, LiDAR, lithium battery, LSTM, machine learning6, machine learning fatigue prediction, magnetic separator, magnetostatic, Medical Systems, metrics, Middle East, Model Driven Architecture, Model-Driven Engineering, modeling, modeling and simulation2, Morphological Data, multidimensional indexing, Multilayer neural network, Multiplayer, multiuser systems, Networking, networks, neural network2, Non-destructive testing (NDT), Non-ordered Discrete Data Space, OFDM, OSN, Overlapping classes, oversampling algorithms, pavement crack, personalised learning, Petri nets2, Pipeline inspection, point cloud, poisoning attack, polarized weight, Proxy, quality model, quiz, real-time, Recommender System, Reliability, reverse engineering, Routing Protocol, scalable cloud native platform, second contour, Security2, self-driving cars, Similarity in Images, simulation, Smart City, Smart Ecosystems, SNA, SOC Estimation, software comprehension, Software Engineering, Software Engineering Management, software evolution, Software Modernization, Software Productivity, SOH diagnosis, Spam filter, spatial visualization, statistics, STEAMS, Stroke, Subarachnoid Hemorrhage, Syllabus, team science, text processing, Threats, Time Petri nets, Triads, Trivial Operations, Trust, UI Error, Undersampling Algorithms, Underwater channel, Underwater sensor network (UWSN), update, urban fabric, user interface, Utility loss, Virtual Reality, visualization, voice, Voice in Online Learning, Vulnerabilities, VZ, web application, Wireless Sensor Network, word segmentation, XGBoost regression., zero-skipping. |
|