[go: up one dir, main page]

CATA 2020: Volume Information

Proceedings of 35th International Conference on Computers and Their Applications

Editors: Gordon Lee and Ying Jin
41 articles402 pagesPublished: March 9, 2020

Papers

Session MA2: Visualization and Image Processing
Conor Carroll, Nupur Garg, Theresa Migler, Barbara Walker and Zoë Wood
1-12
Alexander Novotny, Rowan Gudmundsson and Frederick Harris
13-21
Thitivatr Patanasakpinyo and Les Miller
22-31
Andrew Muñoz, Frederick Harris and Sergiu Dascalu
32-39
Session MP1: Cybersecurity, Threat Analytics and Internet Censorship Issues
Nick Rahimi, Jordan Maynor and Bidyut Gupta
40-47
Aakanksha Rastogi and Kendall Nygard
48-59
Nick Rahimi and Bidyut Gupta
60-68
Mostofa Ahsan and Kendall Nygard
69-79
Session MP2: Computing in Business and Urban Planning
Naai-Jung Shih, Cheng-Yu Hsieh, Yi Chen and Pei-Huang Diao
80-89
Laurie Butgereit
90-97
Hamza Abdelmalek, Gino Chénard, Ismaïl Khriss and Abdeslam Jakimi
98-111
Narayan Debnath, Mario Gabriel Peralta, Carlos Humberto Salgado, Luis Roque, Daniel Riesco, Germán Montejano and Mouna Mazzi
112-121
Session MP3: Database Management and Operating Systems
Ramblin Cherniak, Qiang Zhu and Sakti Pramanik
122-133
Ying Jin, Vadlamannati Bharath and Jinaliben Shah
134-140
Waleed Almutairi and Ryszard Janicki
141-150
Navid Ordouie, Rasha Almajed, Ramesh Karne, Alexander Wijesinha, Joel Weymouth and Nirmala Soundararajan
151-160
Session MP4: Algorithms and Methods in Computing
Maher Selim, Ryan Zhou, Wenying Feng and Omar Alam
161-169
N Sutta, Z Liu and X Zhang
170-179
Toshiyuki Haruhara, Hideto Ohgi, Masaaki Suzuki, Hiroyuki Takao, Takashi Suzuki, Soichiro Fujimura, Toshihiro Ishibashi, Makoto Yamamoto, Yuichi Murayama and Hayato Ohwada
180-186
Hui Guo and Qin Ding
187-196
Jacob Sukhodolsky
197-205
Session TA2: Neural Networks
Jong Hyun Lee, Hyun Sil Kim and In Soo Lee
206-213
Alaa Sheta, Hamza Turabieh, Sultan Aljahdali and Abdulaziz Alangari
214-223
Hoang Son Nguyen, Yu Takahata, Masaaki Goto, Tetsuo Tanaka, Akihiko Ohsuga and Kazunori Matsumoto
224-229
Mason Chen and Charles Chen
230-241
Session TP2: Software Engineering Applications
Runa Ganguli, Akash Mehta, Narayan Debnath, Sultan Aljahdali and Soumya Sen
242-255
Alexander Iliev and Peter Stanchev
256-263
Avick Kumar Dey, Bibek Poddar, Pijush Kanti Dutta Pramanik, Narayan C Debnath, Sultan Aljahdali and Prasenjit Choudhury
264-276
Cuauhtemoc Lopez-Martin
277-286
Session TP3: Computing Applications
Takashi Ohnishi and Keiichi Watanuki
287-296
Garrett Hope, Paul Brodhead and Seung-yun Kim
297-306
Huda Aldosari, Raafat Elfouly, Reda Ammar and Mohammad Alsulami
307-316
Paul Brodhead, Garrett Hope and Seung-yun Kim
317-326
Session WA1: Performance Issues in Computing
Lamyaa Al-Omairi, Jemal Abawajy and Morshed Chowdhury
327-333
Deok Nam
334-344
Said El-Khamy and Dalia Ibrahim
345-354
Ramin Sharifi, Pouya Shiri and Amirali Baniasadi
355-361
Session WA2: Enhancing the Human Condition through Computing
Izzat Alsmadi, Zaid Almubaid and Hisham Al-Mubaid
362-371
Haider Kassem, Morshed Chowdhury, Jemal Abawajy and Ahmed Al-Sudani
372-382
Paul Cappaert and Alex Redei
383-392
Nabila Mansouri, Hana Bougueddima and Yousra Ben Jemaa
393-402

Keyphrases

3D reconstruction, 3DHOG, Active Rule, adaptive system, Address Verification, Advanced Driver Assistance Systems, Age estimation, algorithm, ANSYS, Anti-Censorship, Architecture-Driven Modernization, Artificial Intelligence2, Assignment, Bare Machine Computing, bare PC, Binary Transformation Methodology, Biometrics, block, Business Intelligence, Capsule Networks, censorship, cerebral aneurysm, Channel-matched, cheating, Classification2, classification algorithms, Classifier, clinical data, cluster, Clustering, CNN, code analysis, Cognitive score, collaboration, Computational Fluid Dynamics, Concentration degree, Convolutional Neural Network, Convolutional Neural Networks, course, cultural heritage, cultural tourism, Cybersecurity, data analysis, Data Mining/Knowledge Discovery, database, Definitive Screening Design, dense substructure, density-based clustering, depth map, Dimension reduction techniques, Disease monitoring and surveillance, Disease outbreak detection, Django application, Driver Yawning, Drivers Fatigue, EEG signal, email spam, Emotions, Energy Forecasting, environmental data, ethics, Evasion Attack, execution environment, facial detection, Facial Landmark Detection, Fatigue Prediction, foreign metal removal, Friend suggestion, Fuzzy Petri nets, Geohash, Geometry computing, GIS, Google Trends, graph, Graph Database System, Graph Dimensionality reduction, graph theory, graphics, Handwriting Recognition, Hemodynamic Data, hierarchical clustering, homework, Human-Computer Visualization, image processing, image semantics, imbalance data, indicators, informal sector, Inspection, interactive exhibit, Internet, Intrusion Detection, IoT, JMP, Kinect, learner classification, LiDAR, lithium battery, LSTM, machine learning6, machine learning fatigue prediction, magnetic separator, magnetostatic, Medical Systems, metrics, Middle East, Model Driven Architecture, Model-Driven Engineering, modeling, modeling and simulation2, Morphological Data, multidimensional indexing, Multilayer neural network, Multiplayer, multiuser systems, Networking, networks, neural network2, Non-destructive testing (NDT), Non-ordered Discrete Data Space, OFDM, OSN, Overlapping classes, oversampling algorithms, pavement crack, personalised learning, Petri nets2, Pipeline inspection, point cloud, poisoning attack, polarized weight, Proxy, quality model, quiz, real-time, Recommender System, Reliability, reverse engineering, Routing Protocol, scalable cloud native platform, second contour, Security2, self-driving cars, Similarity in Images, simulation, Smart City, Smart Ecosystems, SNA, SOC Estimation, software comprehension, Software Engineering, Software Engineering Management, software evolution, Software Modernization, Software Productivity, SOH diagnosis, Spam filter, spatial visualization, statistics, STEAMS, Stroke, Subarachnoid Hemorrhage, Syllabus, team science, text processing, Threats, Time Petri nets, Triads, Trivial Operations, Trust, UI Error, Undersampling Algorithms, Underwater channel, Underwater sensor network (UWSN), update, urban fabric, user interface, Utility loss, Virtual Reality, visualization, voice, Voice in Online Learning, Vulnerabilities, VZ, web application, Wireless Sensor Network, word segmentation, XGBoost regression., zero-skipping.