default search action
SAI 2021: Virtual Event
- Kohei Arai:
Intelligent Computing - Proceedings of the 2021 Computing Conference, Volume 3, SAI 2021, Virtual Event, 15-16 July, 2021. Lecture Notes in Networks and Systems 285, Springer 2021, ISBN 978-3-030-80128-1 - Marisol Roldán-Palacios, Aurelio López-López:
Feature Analysis for Aphasic or Abnormal Language Caused by Injury. 1-16 - Odai S. Salman, Ran Klein:
Automatic Detection and Segmentation of Liver Tumors in Computed Tomography Images: Methods and Limitations. 17-35 - Reem Alwashmi, Nesreen Alharbi, Aliaa M. Alabdali, Arwa A. Mashat:
HEMAYAH: A Proposed Mobile Application System for Tracking and Preventing COVID-19 Outbreaks in Saudi Arabia. 36-47 - Igor Godefroy Kouam Kamdem, Marcellin Julius Antonio Nkenlifack:
Data Security in Health Systems: Case of Cameroon. 48-57 - Dalia Attas, Bahman Mirheidari, Daniel Blackburn, Annalena Venneri, Traci Walker, Kirsty Harkness, Markus Reuber, Chris Blackmore, Heidi Christensen:
Predicting Levels of Depression and Anxiety in People with Neurodegenerative Memory Complaints Presenting with Confounding Symptoms. 58-69 - Konstantin Kalinin, Yuriy Mironenko, Mikhail Kopeliovich, Mikhail Petrushan:
Towards Collecting Big Data for Remote Photoplethysmography. 70-86 - Safa Meraghni, Khaled Benaggoune, Zeina Al Masry, Labib Sadek Terrissa, Christine Devalland, Noureddine Zerhouni:
Towards Digital Twins Driven Breast Cancer Detection. 87-99 - Samuel Ofosu Mensah, Bubacarr Bah, Willie Brink:
Towards the Localisation of Lesions in Diabetic Retinopathy. 100-107 - Sarang Chaudhari, Michael Clear, Philip Bradish, Hitesh Tewari:
Framework for a DLT Based COVID-19 Passport. 108-123 - Daqing Chen, Laureta Hajderanj, Sarah Mallet, Pierre Camenen, Bo Li, Hao Ren, Erlong Zhao:
Deep Learning Causal Attributions of Breast Cancer. 124-135 - Alicja Smolikowska, Pawel Kaminski, Rafal Obuchowicz, Adam Piórkowski:
Effect of Adaptive Histogram Equalization of Orthopedic Radiograph Images on the Accuracy of Implant Delineation Using Active Contours. 136-144 - Aya Mohamed Morsy, Mostafa Abdel Azim Mostafa:
Identification Diseases Using Apriori Algorithm on DevOps. 145-160 - Signe Marie Cleveland, Moutaz Haddara:
IoT for Diabetics: A User Perspective. 161-172 - Majed Alkhusaili, Kalim Qureshi:
Case Study: UML Framework of Obesity Control Health Information System. 173-191 - Sarah A. McHale, Ella Pereira:
An IoT Based Epilepsy Monitoring Model. 192-207 - Esther Pearson:
Biostatistics in Biomedicine and Informatics. 208-212 - Alexander Kozlov, Ivan Lazarevich, Vasily Shamporov, Nikolay Lyalyushkin, Yury Gorbachev:
Neural Network Compression Framework for Fast Model Inference. 213-232 - Tihomir Taskov, Juliana Dushanova:
Small-World Propensity in Developmental Dyslexia After Visual Training Intervention. 233-258 - Hossein Bonakdari, Azadeh Gholami, Bahram Gharabaghi, Isa Ebtehaj, Ali Akbar Akhtari:
An Assessment of Extreme Learning Machine Model for Estimation of Flow Variables in Curved Irrigation Channels. 259-269 - Stanislav Selitskiy, Nikolaos Christou, Natalya Selitskaya:
Benchmarking of Fully Connected and Convolutional Neural Networks on Face Recognition: Case of Makeup and Occlusions. 270-285 - Yaqing Luo:
Wavelet Neural Network Model with Time-Frequency Analysis for Accurate Share Prices Prediction. 286-297 - Vasco Lopes, Paulo A. P. Fazendeiro:
A Hybrid Method for Training Convolutional Neural Networks. 298-308 - Jim Q. Chen:
A Layered Framework for Dealing with Dilemmas in Artificial Intelligence Systems. 309-326 - Ryan M. Gibson, Gordon Morison:
Improving Student Engagement and Active Learning with Embedded Automated Self-assessment Quizzes: Case Study in Computer System Architecture Design. 327-339 - Maryna Popova, Rina Novogrudska:
Cognitive Load of Ontology as a Means of Information Representation in the Educational Process. 340-352 - Dalibor Peic, Andrija Bernik:
The Influence of Computer Games on High School Students (Adolescents). 353-368 - Ashok Kumar Veerasamy, Peter Larsson, Mikko-Ville Apiola, Daryl J. D'Souza, Mikko-Jussi Laakso:
Pedagogical Approaches in Computational Thinking-Integrated STEAM Learning Settings: A Literature Review. 369-389 - Alex J. Deakyne, Thomas Valenzuela, Paul A. Iaizzo:
Development of Anaglyph 3D Functionality for Cost-Effective Virtual Reality Anatomical Education. 390-398 - Monica Maiti, M. Priyaadharshini, B. Vinayaga Sundaram:
Augmented Reality in Virtual Classroom for Higher Education During COVID-19 Pandemic. 399-418 - Levis Zerpa:
The Teaching and Learning of the Untyped Lambda Calculus Through Web-Based e-Learning Tools. 419-436 - Askar Boranbayev, Ruslan Baidyussenov, Mikhail Mazhitov:
Development and Design of a Library Information System Intended for Automation of Processes in Higher Education Institution. 437-445 - Darron Lamkin, Robin Ghosh, Tutaleni I. Asino, Tor A. Kwembe:
Informally Teaching Black Youth STEM Concepts Virtually Using Artificial Intelligence and Machine Learning. 446-461 - Osama A. Marzouk:
Accrediting Artificial Intelligence Programs from the Omani and the International ABET Perspectives. 462-474 - Susana Sanchez:
Embodied Learning: Capitalizing on Predictive Processing. 475-490 - Tobias Nyström:
Exploring the Darkness of Gamification: You Want It Darker? 491-506 - Dalize van Heerden, Leila Goosen:
The Future of Information and Communication Technology Courses. 507-526 - Dolores Kamenar Cokor, Andrija Bernik:
The Impact of Computer Games on Preschool Children's Cognitive Skills. 527-541 - Manuel Rodrigues:
Using STEM to Improve Computer Programming Teaching. 542-548 - Richard Halstead-Nussloch, Rebecca H. Rutherfoord:
Tips for Using Open Educational Resources to Reduce Textbook Costs in Computing and IT Courses. 549-559 - Meina Tawaki, Keiko Yamamoto, Ichi Kanaya:
Cross-Cultural Design of Simplified Facial Expressions. 560-574 - Emmanouil Koulas, Marios Anthopoulos, Sotiria Grammenou, Christos Kaimakamis, Konstantinos Kousaris, Fotini-Rafailia Panavou, Orestis Piskioulis, Syed Iftikhar Hussain Shah, Vassilios Peristeras:
Misinformation and Its Stakeholders in Europe: A Web-Based Analysis. 575-594 - Bianca Tonino-Heiden, Bernhard Heiden, Volodymyr Alieksieiev:
Artificial Life: Investigations About a Universal Osmotic Paradigm (UOP). 595-605 - Josiah Eleazar T. Regencia, William Emmanuel S. Yu:
Latency and Throughput Advantage of Leaf-Enforced Quality of Service in Software-Defined Networking for Large Traffic Flows. 606-623 - Mui Joo Tang, Eang Teng Chan:
The Impact of Online Social Networking (Social Media) on Interpersonal Communication and Relationships. 624-640 - Andrés Rico, Carson Smuts, Jason Nawyn, Kent Larson:
Embedded Piezoelectric Array for Measuring Relative Distributed Forces on Snow Skis. 641-648 - Samirah A. Alhusayni, Shuruq K. Alsuwat, Shahd H. Altalhi, Faris A. Almalki, Hawwaa S. Alzahrani:
Experimental Study of a Tethered Balloon Using 5G Antenna to Enhance Internet Connectivity. 649-663 - Rui Pinto, Gil Gonçalves, Jerker Delsing, Eduardo Tovar:
Incremental Dendritic Cell Algorithm for Intrusion Detection in Cyber-Physical Production Systems. 664-680 - Emanuele Bellini, Matteo Rossi:
Performance Comparison Between Deep Learning-Based and Conventional Cryptographic Distinguishers. 681-701 - Jakub Klemsa:
TFHE Parameter Setup for Effective and Error-Free Neural Network Prediction on Encrypted Data. 702-721 - Efthimios-Enias Gojka, Niclas Kannengießer, Benjamin Sturm, Jan Bartsch, Ali Sunyaev:
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors. 722-742 - Ahmad Ghafarian, Darius Fiallo:
An Analysis of Twitter Security and Privacy Using Memory Forensics. 743-760 - Souhaïl El Ghazi El Houssaïni, Ilham Maskani, Jaouad Boutahar:
A Security Requirement Engineering Case Study: Challenges and Lessons Learned. 761-783 - Romas Vijeikis, Vidas Raudonis, Gintaras Dervinis:
Towards Automated Surveillance: A Review of Intelligent Video Surveillance. 784-803 - Juan Moreno, Sebastián Quintero, Alvaro Riascos, Luis Gustavo Nonato, Cristian Sánchez:
Homicide Prediction Using Sequential Features from Graph Signal Processing. 804-817 - Alessandro Annarelli, Serena Clemente, Fabio Nonino, Giulia Palombi:
Effectiveness and Adoption of NIST Managerial Practices for Cyber Resilience in Italy. 818-832 - Hector Caballero-Hernandez, Vianney Muñoz-Jiménez, Marco A. Ramos:
Steganographic Method to Data Hiding in RGB Images Using Pixels Redistribution Combining Fractal-Based Coding and DWT. 833-850 - Ahmad Whafa Azka Al Azkiyai, Ari Moesriami Barmawi, Bambang Ari Wahyudi:
Improving the Imperceptibility of Pixel Value Difference and LSB Substitution Based Steganography Using Modulo Encoding. 851-867 - Ammar S. Salman, Wenliang (Kevin) Du:
Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework. 868-884 - Milena Gjorgjievska Perusheska, Vesna Dimitrova, Aleksandra Popovska-Mitrovikj, Stefan Andonov:
Application of Machine Learning in Cryptanalysis Concerning Algorithms from Symmetric Cryptography. 885-903 - Christopher Robert Philabaum, Christopher Coffey, Bertrand Cambou, Michael Gowanlock:
A Response-Based Cryptography Engine in Distributed-Memory. 904-922 - Daniele Di Tullio, Manoj Gyawali:
Elliptic Curves of Nearly Prime Order. 923-932 - Glenn Papp, Petter Lovaas:
Assessing Small Institutions' Cyber Security Awareness Using Human Aspects of Information Security Questionnaire (HAIS-Q). 933-948 - Evercita C. Eugenio, Fang Liu:
Construction of Differentially Private Empirical Distributions from a Low-Order Marginals Set Through Solving Linear Equations with l2 Regularization. 949-966 - Shizra Sultan, Christian Damsgaard Jensen:
Secondary Use Prevention in Large-Scale Data Lakes. 967-985 - Mohamed Chawki:
Cybercrime in the Context of COVID-19. 986-1002 - Federico Palmaro, Luisa Franchina:
Beware of Unknown Areas to Notify Adversaries: Detecting Dynamic Binary Instrumentation Runtimes with Low-Level Memory Scanning. 1003-1019 - Bertrand Cambou, Ying-Chen Chen:
Tamper Sensitive Ternary ReRAM-Based PUFs. 1020-1040 - Denise Dragos, Suzanna Schmeelk:
Locating the Perpetrator: Industry Perspectives of Cellebrite Education and Roles of GIS Data in Cybersecurity and Digital Forensics. 1041-1050 - Ivaylo Chenchev, Adelina Aleksieva-Petrova, Milen Petrov:
Authentication Mechanisms and Classification: A Literature Survey. 1051-1070 - Kavinga Yapa Abeywardena, A. M. I. S. Abeykoon, A. M. S. P. B. Atapattu, H. N. Jayawardhane, C. N. Samarasekara:
ARCSECURE: Centralized Hub for Securing a Network of IoT Devices. 1071-1082 - Christoforos Nalmpantis, Lazaros Vrysis, Danai Vlachava, Lefteris Papageorgiou, Dimitris Vrakas:
Entropy Based Feature Pooling in Speech Command Classification. 1083-1091
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.