PROGRAM
Friday, November 11th
View this program: with abstractssession overviewtalk overview
08:10-09:00 Session 2
Location: Azalea
08:10 | Neuromorphic Computing from the Computer Science Perspective: Algorithms and Applications (abstract) |
09:15-09:35 Session 3A
Location: Dogwood II
09:15 | Role Playing to teach Object Oriented Programming Concepts (abstract) |
09:15-09:35 Session 3B
Location: Highlander I
09:15 | Integrating GitHub Classroom into Early CS Courses (abstract) |
09:15-09:35 Session 3C
Location: Azalea
09:15 | “Out of Sight, Out of Mind” Comparing Deaf and Hard of Hearing Child’s Response to ASL Recommendation Systems (abstract) |
09:15-09:35 Session 3D
Location: Dogwood I
09:15 | Preventing Replay Attacks on Voice-based Authentication System using Machine Learning (abstract) |
09:35-09:55 Session 4A
Location: Dogwood II
09:35 | Clearing the Cobwebs: The Benefits of Identifying Online Human Trafficking using a Web Crawler (abstract) |
09:35-09:55 Session 4B
Location: Highlander I
09:35 | Facts and Facet Extraction on Bangla Text: A new approach to abstractive summarization in Bengali Text Summarization (abstract) |
09:35-09:55 Session 4C
Location: Azalea
09:35 | A Comparative Performance Study of Different Machine Learning Models for a Classification Problem with Relatively Large Amount of Data (abstract) |
09:35-09:55 Session 4D
Location: Dogwood I
09:35 | Navigation optimization analysis: Comparing algorithms for the Travelling Salesman Problem (abstract) |
09:55-10:15 Session 5B
Location: Highlander I
09:55 | A Smashingly Irresponsible Low-Level C Assignment (abstract) |
09:55-10:15 Session 5C
Location: Azalea
09:55 | Matching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover (abstract) |
10:15-10:35 Session 6A
Location: Dogwood II
10:15 | Deployment of Virtualization Technology to Offer a Computer Networking IT Degree Online (abstract) |
10:15-10:35 Session 6B
Location: Highlander I
10:15 | Enterprise Content Management Cloud Computing and Data Classification (abstract) |
10:15-10:35 Session 6D
Location: Dogwood I
10:15 | Mirroring an Arm: Creating a Locally Programmed Prosthetic Limb (abstract) |
10:40-11:00 Session 7A
Location: Dogwood II
10:40 | Teaching Database Security in an Undergraduate Database Administration Course Serving Computer Science and Cybersecurity Students (abstract) |
10:40-11:00 Session 7B
Location: Highlander I
10:40 | Creating a Maintainable and Reusable WebGL Graphics Engine Architecture (abstract) |
10:40-11:00 Session 7C
Location: Azalea
10:40 | MUTUAL AUTHENTICATION PROTOCOL USING HARDWARE SECURITY MODULE FOR IOT DEVICES (abstract) |
11:00-11:20 Session 8A
Location: Dogwood II
11:00 | Factors Influencing the Decision to Offer Cybersecurity Curriculum at Small Higher Education Institutions (abstract) |
11:00-11:20 Session 8D
Location: Dogwood I
11:00 | Developing a License Plate Detection and Character Recognition Model for Performance Evaluation and Optimization (abstract) |
11:20-11:40 Session 9A
Location: Dogwood II
11:20 | A SONG RECOMMENDATION SYSTEM USING SENTIMENT ANALYSIS BASED ON USER REVIEWS (abstract) |
11:20-11:40 Session 9B
Location: Highlander I
11:20 | Open Educational Resources (OER) in Computer Engineering Education (abstract) |
11:20-11:40 Session 9D
Location: Dogwood I
11:20 | Using Machine Learning to Reduce MEG Interference (abstract) |
11:40-12:00 Session 10B
Location: Highlander I
13:00-13:20 Session 11A
Location: Dogwood II
13:00 | Computer Science Education: A Fly in the Ointment (abstract) |
13:00-13:20 Session 11B
Location: Highlander I
13:00 | Improving Semantic Matching for Voice Assistants (abstract) |
13:00-14:20 Session 11D
Location: Dogwood I
Object Detection with Raspberry Pi (abstract) |
Utilizing Innovative Technology to Bring Specialized Museum Exhibits and Tech Optimism to Rural Communities in South Central Kentucky (abstract) |
Gardening Monitor (abstract) |
Analysis of Label-Flip Poisoning Attack on Machine Learning based Malware Detectors (abstract) |
Virtual Reality Campus Tour Using 3D Modeling and Scanning (abstract) |
UAV Cave Mapping and VR Experience (abstract) |
Using LabView to Monitor and Control a Greenhouse (abstract) |
13:20-13:40 Session 12B
Location: Highlander I
13:20 | Improving flight efficiency through wind-sampling framework for drone swarms (abstract) |
13:40-14:00 Session 13A
Location: Dogwood II
13:40 | Class and Its Object: Notion and Substance (abstract) |
13:40-14:00 Session 13B
Location: Highlander I
13:40 | Examining Intentions to Use Online Tools Post-pandemic with UTAUT for m-Learning Model (abstract) |
14:00-14:20 Session 14A
Location: Dogwood II
14:00 | Automating the Parallel Composition of Cyberattack Models: The Experiences of a Capstone Team (abstract) |
14:00-14:20 Session 14B
Location: Highlander I
14:00 | CS Makers in Alabama: What does it look like? (abstract) |
14:35-14:55 Session 15
Location: Dogwood II
14:35 | Skin Cancer Detection and Classification by using Deep learning. FPS and Accuracy Custom Model and ResNet 18 and AlexNet (abstract) |
15:15-15:35 Session 17
Location: Dogwood II
15:15 | The Evolvement in Cyber Activities as a Pathway to Determine Human Trafficking (abstract) |
15:35-15:55 Session 18
Location: Dogwood II
15:35 | A Minimalist Approach to Gamification of Introductory Computer Programming Courses (abstract) |