SOICT 2018: THE NINTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
Abstractive summarization
Action Recognition
activating shopping areas
Agent-based Monitoring
ALICA
ALNS
android malware detection
Anholt
Anomaly Detection
Anomaly-based Attack Detection
Answer Set Programming
AQM
Artificial Intelligence
Artificial Intelligent
assessment of the cluster tendency
Autoencoder
Automated Program Repair
automated testing
B
background subtraction
bagging
Bayesian Networks
behavior
BFS
Bidirectional Recurrent Neural Network
Big code
Big Data Analytics
bilinear attention
biometric template protection
Biometrics
bird’s eye image
Blockchain
Blockchain adoption
boosting
Breath Analysis
C
calf
CAPE
cattle
Certificate Verification
Change Detection
Chatbot
Checkpointing Aided Parallel Execution
circle fitting
citation network analysis
classification of gene expression data
Closeness Centrality
Clothes recognition
cloud computing
clustering
co-operative caching
Code bloat
Code Growth
combined objective
community
community extraction
convolutional neural network
Convolutional Neural Networks
Counterfeit
cow
cow estrus detection
CPM
Crowd Density Estimation
Crowded Scene Counting
D
Data Integration
Decentralization
Decentralized Application
Decision Tree
deep learning
Denmark
depth camera
discord discovery
discrete wavelet transformation
Distributed Computing
document clustering
document network
drone delivery
drug responses
drug-cell line responses
dynamic content popularity
dynamic time wrapping
E
edge detection
Electronics nose
ellipse fitting
Emulation
ensemble
Entailment
episode-rule mining
F
Fashion search system
Fast Food Restaurant
Feature extraction
Fingerprint matching
fingerprint recognition
first local maximization
Fisher Criterion
fog computing
Frozen shoulder rehabilitation
Fully Convolutional Neural Network
Future trends of Blockchain
fuzzy commitment scheme
G
Gabor wavelet
gait authentication
Gated Recurrent Units
Gaussian mixture model
genetic algorithm
Genetic Programming
Geometrical features
GPS
graph algorithm
graph theory
GRASP
H
Health screening
Helpful review retrieval
High Availability Distributed Cluster
HPC
hybrid caching
Hybrid testbed
I
iJoint
ILP
Image captioning
image detection
Image similarity learning
Importance Sampling
incentive design
Information extraction
Information security evaluation
Information security level
Intelligent Assistant
interaction
Internet of Things
IoT
IoT networks
IoT Services
ISO/IEC 15408
K
Kanban
Knowledge graphs
L
Large-scale testbed
LDA
Lifelog processing
Local features
Local minutiae matching
Location Pattern
Louvain Method
Low-rate DDoS attack
M
Machine learning
Machine Learning-based Attack Detection
Malware Detection
MapReduce
matrix completion
maximum induced matching
Micro-Services
minutiae fingerprint extraction
missing region reconstruction problems
MMPP/D/1 queuing
model adaptation
model checking
Monte Carlo
multi-agent planning
Multi-threaded Parallel Computing
Multiple linear regression model with the elastic net regularization method
mutual information
N
N-gram
natural language processing
Neural network
neural network model
NFC
noisy condition
Normalized Discounted Cumulative Gain
number of clusters
O
object detection
Offshore
OpenMP
Outlier detection
Outsourcing
P
Packet Loss Probability
Parallel Programming
Pavement crack detection
permutation graph
Personalized medicine
polynomial algorithm
Portfolio optimization
Prediction
prediction problems
Probabilistic topic models
Profile matching
Project Risks
Project Scheduling
Q
Quantitative trading
Quantization indexing
R
random ensemble oblique decision stumps
range of motion
real-time system architecture
record and replay
RED
Redundancy Dynamic Control
reinforced mechanism
Remote sensing imagery
Renewable energy
Residual Learning
Residual Networks
Review helpfulness prediction
Rice seed inspection
Risk Factors
Roedsand
routing algorithm
S
satellites
Scrum
Security
Semantic Image Segmentation
Semantics
Sentence Scoring
Sentiment Analysis
Service Evolution
Service Function Chaining (SFC)
SFC Monitoring
Shape descriptor
simulation
Smart city
Smart Learning Environment
Smart Tourist
smartphone authentication
Social Network Analysis
Social networks
Software Defined Networking (SDN)
Spark
Spatial
Speaker Authentication
speech corpus
static analysis
stereo camera
Stock prediction
Streaming time series
sub-optimal content placement
Supervised dimension reduction
system combination
T
Task scheduling
TCP
Text classification
text mining
tf-idf
Threats
three-dimensional reconstruction
Time Series
Time series analysis
topic detection
topic model
Trading strategy
traffic surveillance
Transportation
TSP-D
TSP-mD
U
Ubiquitous system
UiTiOt
Unity 3D
unsupervised learning
user interface testing
V
vehicle-routing
Verification
Vietnamese speech recognition
W
walk rally application
water body segmentation
Web Application Firewall
Web attack detection
Web Document Summarizaion
Web-portal security
Web-site traversal pattern
Website Defacement Attack
Website Defacement Detection
weight estimation
Wind energy
Windows application