Proceedings of 35th International Conference on Computers and Their Applications41 articles•402 pages•Published: March 9, 2020 PapersSession MA2: Visualization and Image Processing | Pages 1-12 | Pages 13-21 | Pages 22-31 | Pages 32-39 | Session MP1: Cybersecurity, Threat Analytics and Internet Censorship Issues | Pages 40-47 | Pages 48-59 | Pages 60-68 | Pages 69-79 | Session MP2: Computing in Business and Urban Planning | Pages 80-89 | Pages 90-97 | Pages 98-111 | Pages 112-121 | Session MP3: Database Management and Operating Systems | Pages 122-133 | Pages 134-140 | Pages 141-150 | Pages 151-160 | Session MP4: Algorithms and Methods in Computing | Pages 161-169 | Pages 170-179 | Pages 180-186 | Pages 187-196 | Pages 197-205 | Session TA2: Neural Networks | Pages 206-213 | Pages 214-223 | Pages 224-229 | Pages 230-241 | Session TP2: Software Engineering Applications | Pages 242-255 | Pages 256-263 | Pages 264-276 | Pages 277-286 | Session TP3: Computing Applications | Pages 287-296 | Pages 297-306 | Pages 307-316 | Pages 317-326 | Session WA1: Performance Issues in Computing | Pages 327-333 | Pages 334-344 | Pages 345-354 | Pages 355-361 | Session WA2: Enhancing the Human Condition through Computing | Pages 362-371 | Pages 372-382 | Pages 383-392 | Pages 393-402 |
Keyphrases3D reconstruction, 3DHOG, Active Rule, adaptive system, Address Verification, Advanced Driver Assistance Systems, Age estimation, algorithm, ANSYS, Anti-Censorship, Architecture-Driven Modernization, Artificial Intelligence2, Assignment, Bare Machine Computing, bare PC, Binary Transformation Methodology, Biometrics, block, Business Intelligence, Capsule Networks, censorship, cerebral aneurysm, Channel-matched, cheating, Classification2, classification algorithms, Classifier, clinical data, cluster, Clustering, CNN, code analysis, Cognitive score, collaboration, Computational Fluid Dynamics, Concentration degree, Convolutional Neural Network, Convolutional Neural Networks, course, cultural heritage, cultural tourism, Cybersecurity, data analysis, Data Mining/Knowledge Discovery, database, Definitive Screening Design, dense substructure, density-based clustering, depth map, Dimension reduction techniques, Disease monitoring and surveillance, Disease outbreak detection, Django application, Driver Yawning, Drivers Fatigue, EEG signal, email spam, Emotions, Energy Forecasting, environmental data, ethics, Evasion Attack, execution environment, facial detection, Facial Landmark Detection, Fatigue Prediction, foreign metal removal, Friend suggestion, Fuzzy Petri nets, Geohash, Geometry computing, GIS, Google Trends, graph, Graph Database System, Graph Dimensionality reduction, graph theory, graphics, Handwriting Recognition, Hemodynamic Data, hierarchical clustering, homework, Human-Computer Visualization, image processing, image semantics, imbalance data, indicators, informal sector, Inspection, interactive exhibit, Internet, Intrusion Detection, IoT, JMP, Kinect, learner classification, LiDAR, lithium battery, LSTM, machine learning6, machine learning fatigue prediction, magnetic separator, magnetostatic, Medical Systems, metrics, Middle East, Model Driven Architecture, Model-Driven Engineering, modeling, modeling and simulation2, Morphological Data, multidimensional indexing, Multilayer neural network, Multiplayer, multiuser systems, Networking, networks, neural network2, Non-destructive testing (NDT), Non-ordered Discrete Data Space, OFDM, OSN, Overlapping classes, oversampling algorithms, pavement crack, personalised learning, Petri nets2, Pipeline inspection, point cloud, poisoning attack, polarized weight, Proxy, quality model, quiz, real-time, Recommender System, Reliability, reverse engineering, Routing Protocol, scalable cloud native platform, second contour, Security2, self-driving cars, Similarity in Images, simulation, Smart City, Smart Ecosystems, SNA, SOC Estimation, software comprehension, Software Engineering, Software Engineering Management, software evolution, Software Modernization, Software Productivity, SOH diagnosis, Spam filter, spatial visualization, statistics, STEAMS, Stroke, Subarachnoid Hemorrhage, Syllabus, team science, text processing, Threats, Time Petri nets, Triads, Trivial Operations, Trust, UI Error, Undersampling Algorithms, Underwater channel, Underwater sensor network (UWSN), update, urban fabric, user interface, Utility loss, Virtual Reality, visualization, voice, Voice in Online Learning, Vulnerabilities, VZ, web application, Wireless Sensor Network, word segmentation, XGBoost regression., zero-skipping |
|