ACM-MIDSE-2022: ACM MID-SOUTHEAST CHAPTER FALL 2022 CONFERENCE
PROGRAM
Friday, November 11th

View this program: with abstractssession overviewtalk overview

08:00-08:10 Session 1
Location: Azalea
08:00
Welcome to the ACM Mid Southeast Conference (abstract)
08:10-09:00 Session 2
Location: Azalea
08:10
Neuromorphic Computing from the Computer Science Perspective: Algorithms and Applications (abstract)
09:15-09:35 Session 3A
Location: Dogwood II
09:15
Role Playing to teach Object Oriented Programming Concepts (abstract)
09:15-09:35 Session 3B
Location: Highlander I
09:15
Integrating GitHub Classroom into Early CS Courses (abstract)
09:15-09:35 Session 3C
Location: Azalea
09:15
“Out of Sight, Out of Mind” Comparing Deaf and Hard of Hearing Child’s Response to ASL Recommendation Systems (abstract)
09:15-09:35 Session 3D
Location: Dogwood I
09:15
Preventing Replay Attacks on Voice-based Authentication System using Machine Learning (abstract)
09:35-09:55 Session 4A
Location: Dogwood II
09:35
Clearing the Cobwebs: The Benefits of Identifying Online Human Trafficking using a Web Crawler (abstract)
09:35-09:55 Session 4B
Location: Highlander I
09:35
Facts and Facet Extraction on Bangla Text: A new approach to abstractive summarization in Bengali Text Summarization (abstract)
09:35-09:55 Session 4C
Location: Azalea
09:35
A Comparative Performance Study of Different Machine Learning Models for a Classification Problem with Relatively Large Amount of Data (abstract)
09:35-09:55 Session 4D
Location: Dogwood I
09:35
Navigation optimization analysis: Comparing algorithms for the Travelling Salesman Problem (abstract)
09:55-10:15 Session 5B
Location: Highlander I
09:55
A Smashingly Irresponsible Low-Level C Assignment (abstract)
09:55-10:15 Session 5C
Location: Azalea
09:55
Matching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover (abstract)
09:55-10:15 Session 5D
Location: Dogwood I
09:55
Eclipse Totality Megamovie Application (abstract)
10:15-10:35 Session 6A
Location: Dogwood II
10:15
Deployment of Virtualization Technology to Offer a Computer Networking IT Degree Online (abstract)
10:15-10:35 Session 6B
Location: Highlander I
10:15
Enterprise Content Management Cloud Computing and Data Classification (abstract)
10:15-10:35 Session 6C
Location: Azalea
10:15
Hopper's Fables, Chapter Two (abstract)
10:15-10:35 Session 6D
Location: Dogwood I
10:15
Mirroring an Arm: Creating a Locally Programmed Prosthetic Limb (abstract)
10:40-11:00 Session 7A
Location: Dogwood II
10:40
Teaching Database Security in an Undergraduate Database Administration Course Serving Computer Science and Cybersecurity Students (abstract)
10:40-11:00 Session 7B
Location: Highlander I
10:40
Creating a Maintainable and Reusable WebGL Graphics Engine Architecture (abstract)
10:40-11:00 Session 7C
Location: Azalea
10:40
MUTUAL AUTHENTICATION PROTOCOL USING HARDWARE SECURITY MODULE FOR IOT DEVICES (abstract)
10:40-11:00 Session 7D
Location: Dogwood I
10:40
Wheelchair Driving The Mountains (abstract)
11:00-11:20 Session 8A
Location: Dogwood II
11:00
Factors Influencing the Decision to Offer Cybersecurity Curriculum at Small Higher Education Institutions (abstract)
11:00-11:20 Session 8B
Location: Highlander I
11:00
Environment for Robotics Research (abstract)
11:00-11:20 Session 8D
Location: Dogwood I
11:00
Developing a License Plate Detection and Character Recognition Model for Performance Evaluation and Optimization (abstract)
11:20-11:40 Session 9A
Location: Dogwood II
11:20
A SONG RECOMMENDATION SYSTEM USING SENTIMENT ANALYSIS BASED ON USER REVIEWS (abstract)
11:20-11:40 Session 9B
Location: Highlander I
11:20
Open Educational Resources (OER) in Computer Engineering Education (abstract)
11:20-11:40 Session 9D
Location: Dogwood I
11:20
Using Machine Learning to Reduce MEG Interference (abstract)
11:40-12:00 Session 10A
Location: Dogwood II
11:40
Python as a First Language (abstract)
11:40-12:00 Session 10C
Location: Azalea
11:40
Kronos: A Virtual Reality Roguelike (abstract)
13:00-13:20 Session 11A
Location: Dogwood II
13:00
Computer Science Education: A Fly in the Ointment (abstract)
13:00-13:20 Session 11B
Location: Highlander I
13:00
Improving Semantic Matching for Voice Assistants (abstract)
13:00-13:20 Session 11C
Location: Azalea
13:00
Emergency Alert System – Proof of Concept (abstract)
13:00-14:20 Session 11D
Location: Dogwood I
Object Detection with Raspberry Pi (abstract)
Utilizing Innovative Technology to Bring Specialized Museum Exhibits and Tech Optimism to Rural Communities in South Central Kentucky (abstract)
Gardening Monitor (abstract)
Analysis of Label-Flip Poisoning Attack on Machine Learning based Malware Detectors (abstract)
Virtual Reality Campus Tour Using 3D Modeling and Scanning (abstract)
UAV Cave Mapping and VR Experience (abstract)
Using LabView to Monitor and Control a Greenhouse (abstract)
13:20-13:40 Session 12A
Location: Dogwood II
13:20
CompileIt Updates (abstract)
13:20-13:40 Session 12B
Location: Highlander I
13:20
Improving flight efficiency through wind-sampling framework for drone swarms (abstract)
13:20-13:40 Session 12C
Location: Azalea
13:20
Cybersecurity Risks to Agriculture (abstract)
13:40-14:00 Session 13A
Location: Dogwood II
13:40
Class and Its Object: Notion and Substance (abstract)
13:40-14:00 Session 13B
Location: Highlander I
13:40
Examining Intentions to Use Online Tools Post-pandemic with UTAUT for m-Learning Model (abstract)
13:40-14:00 Session 13C
Location: Azalea
13:40
Cybersecurity Risk Management (abstract)
14:00-14:20 Session 14A
Location: Dogwood II
14:00
Automating the Parallel Composition of Cyberattack Models: The Experiences of a Capstone Team (abstract)
14:00-14:20 Session 14B
Location: Highlander I
14:00
CS Makers in Alabama: What does it look like? (abstract)
14:00-14:20 Session 14C
Location: Azalea
14:00
Fly By ML: Wing Leveling via CNN (abstract)
14:35-14:55 Session 15
Location: Dogwood II
14:35
Skin Cancer Detection and Classification by using Deep learning. FPS and Accuracy Custom Model and ResNet 18 and AlexNet (abstract)
15:15-15:35 Session 17
Location: Dogwood II
15:15
The Evolvement in Cyber Activities as a Pathway to Determine Human Trafficking (abstract)
15:35-15:55 Session 18
Location: Dogwood II
15:35
A Minimalist Approach to Gamification of Introductory Computer Programming Courses (abstract)