SOICT 2016: THE SEVENTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

3
3D point cloud
3D Wireless Sensor Network
A
accent component
Adaptive MFRAT Filter
Agent Based Modeling
Agent based Modelling and Simulation
agent-based model
Algorithms
analysis
Analytical model
Ant Colony Optimization – ACO
anytime algorithm
application deployment
Atheros ath5k
Attention
B
Bayesian optimization
BFD-NN
Bi-gram
Bidirectional LSTM
big data speech classification
Boundary point
Broadcom b43
Brownian motion
Bus System
Byzantine Attacks
C
cabinet layout
CALL(Computer Assisted Language Learning)
Camera
Canonical Correlation Analysis
cell image segmentation
Change Effort Estimation
Change Impact Analysis
closed high-utility itemset
cloud computing
Clustering
color image
Complex Filter
Complex systems
Compression
Conformail Geometric Algebra
Consensus Algorithms
constrained clustering
convolutional neural networks
coordinates in 3 dimensional
copy detection
Correlation
CPU Frequency
credit scorig
crisis situation
Cross-domain Sentiment Classification
cyber range
cybersecurity education
cybersecurity practice
D
data center deployment
Data hiding
data mining
DCT
decryption
deep learning
Deep Neural Network
defualt probability
Delegating Computation
delta feature
denoising
determinant
DGA Botnet detection
Diagonal cabling
dialog act
Dictionary Learning
Differential Evolution
Diffusion Process
Digital holography
dissimilarity
distance
distortion drift
distributed configuration
Distributed Systems
DNA
drug-target prediction
Duty cycling
Dynamic programming
dynamic time warping
Dynamic VRP – DVRP
E
ECQV Implicit Certificate
Effort Estimation
eigenvalue
eigenvector
Elastic net
Elevation surface
Embedded system
embedding capacity
Emotion
Encrypted application traffic
encryption
Energy consumption
Energy efficiency
Energy-aware virtual machine allocation
Energy-balanced unequal clustering
Enhancement
Entropy
Epidemic
Euler-Lagrange equation
evacuation process
exact copy
extractive summarization
F
Fall detection
feature selection
Fingerprints
Foreign ownership
four-wave mixing (FWM)
FPGA
fusion method
Fuzzy clustering
G
Gabor Filter
GAMA platform
Green cloud
H
H.264/AVC
hand gesture recognition
Hardware acceleration
high performance computing
high-utility itemset
Hole filling
Human Activity Recognition
I
image annotation
Imbalanced data
Impact Analysis
in-Memory
Indoor environment
information retrieval
Instance Hiding
integration
Intention mining
interconnection network
Intervention
Intrusion Detection
Inversion Radviz
IoT Security
J
JOCOR
K
K-mean
K-Means Algorithm
K-medoids clustering
Kalman filter
Key Agreement
key frames
key-value
knowledge transmission
L
language education
language grid
Lasso
Latent Dirichlet Allocation
legacy components
Lens Free Imager
Linear Symmetry Filter
lnbnn mapreduce
Load balancing
local search
Location Search
logistic approach
Long range PON
M
Machine learning
machine translation services
Mahalanobis distance
MANETs
Markov random fields (MRFs)
medoid initialization
metric
Mobile System
Motion features
multi-hop network
multilabel classification
multilingual communication
Multipath routing
multithreading technique
Multivariate Data Visualization
N
natural spoken language understanding
near copy
Network Functions Virtualization
Network lifetime
network performance
Network security
network-based ranking method
Neural Network
NXDomain
O
online social media mining
open-source code
Operating System
operation
Opposition-Based Differential Evolution
optimal algorithm
Optimization
orthogonal frequency division multiplexing (OFDM)
P
pairwise constrained clustering
paraphrase
Particle Swarm Optimization
Passive Input Privacy
Pattern Recognition
Pearson correlation coefficients
Person Search
person tracking
pitch accent
Plagiarism
plagiarism detection
Poisson-Gaussian noise
presentation
Principal Components Regression
Private Outsourcing of Computation
Process Scheduler
prominence detection
prosody
Public Transportation Design
Q
Quality Visualization
R
Radviz
random walk with restart
RDMA
realtime
Recongurable computing
Resource Allocation
Routing holes
S
scalar product
Scene tracking
Segmentation
Sentence Compression
Shape features
significant path
similarity
similarity measure
simulation
Single camera
SLIC
Spark
Sparse Coding
Speech act
speech classification
Statecharts
Static VRP – SVRP
Stock market
Subsequence join
superpixel
Supervised Learning
systems pharmacology
T
Tabu search
Tangent plane
TDMA scheduling
text classification
text understanding
Time series
time varying graphs
Topic Modeling
total variation
Transport Layer Security
U
uncertain database
User Experience
user intent identification
V
Vehicle Routing Problem – VRP
Video Instance Search
video segments
Vietnamese
Vietnamese Sign Language
Vietnamese spoken text processing
Virtual machine allocation
VnIndex
W
Waste Management
wavelength division multiplexing (WDM)
WiFi
Wireless ad-hoc router
Wireless sensor network
Wireless sensor networks
Word Embeddings
WordNet
Workflow scheduling