Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 1 von 14

Details

Autor(en) / Beteiligte
Titel
2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA)
Ort / Verlag
[Place of publication not identified] : IEEE Computer Society,
Erscheinungsjahr
2023
Link zum Volltext
Beschreibungen/Notizen
  • A Data Collection Platform for Network Management -- Automated Network Programmability Using OpenConfig YANG Models and NETCONF Protocol -- Developing IoT-based Smart Health Monitoring Systems using Design Patterns -- Lightweight Feature-based Priority Sampling for Industrial IoT Multivariate Time Series -- New Polar code for 5G New Radio Network -- Using a Correlation Equation to ensure Stability between Personalization and Security in Composing Web Services -- A BigData/Machine Learning system for Monitoring Road Surface Condition -- Improving Channel Utilization in VANETs Using Q-Learning-Based Data Rate Congestion Control -- Uncertainty-Aware Web of Things Composition: A Probabilistic Approach -- A Hybrid Epoch Scheduling Scheme of Mixed Workloads with Different Types of Jobs on Distributed Processors -- EcoSnow: Advancing Green Energy Monitoring with distributed three dimensional Mobile Wireless Sensors Networks -- Fair-Share Methods for Scheduling Scientific Workflows in Cloud -- A Petri Net-based Formal Modeling for Microservices Auto-scaling -- Computerized Irrigation Scheduling -- Wake-Up Receiver Based Routing Protocols in Internet of Things: A Survey -- Design and Implementation of an Automated Network Traffic Analysis System using Elastic Stack -- 2D-ZasHen Chaotic Map-Based Medical Image Cryptographic Approach in IoT-Based Healthcare Monitoring -- Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification -- DLA-ABIDS:Deep Learning Approach for Anomaly Based Intrusion Detection System -- Ensemble Learning Approach for Intrusion Detection Systems in Industrial Internet of Things -- Design and Development of Policy Enforcement for the Privacy by Design Framework -- Securing Automotive Ethernet: Design and Implementation of Security Data Link Solutions -- Empowering Data Federation Security in Polystore Systems -- Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems -- Building Trust in Supply Chains: The Blockchain-QR Code Advantage -- An Anomaly Behavior Analysis Framework for Securing Autonomous Vehicle Perception -- MoonCAB : a Modular Ontology for Computational analysis of Animal Behavior -- Conceptual modeling of a document-oriented NoSQL database -- Diversified Top-k Answering of Cypher Queries over Large Data Graphs -- A New Time-Aware LSTM based Framework for Multi-label Classification on Healthcare Data -- TiVEx: Optimized Processing for Time Series Visual Exploration -- Leveraging Nucleotide Dependencies for Improved mRNA Vaccine Degradation Prediction -- Assessing fuel tax revenues - Study on impact of reducing fuel taxes using artificial intelligence -- At-Risk Students Identification based on Machine Learning Approach: A Case Study of Computer Science Bachelor Student in Tunisia -- A Cross-Validation Approach for Classifying Physical Activity Intensity : A Case Study in Children with Attention Deficit/Hyperactivity Disorder -- Medical data lake query assistance -- Embracing Diversity and Inclusion: A Decolonial Approach to Urban Computing -- Generating and Testing Synthetic Datasets for Recommender Systems to Improve Fairness in Collaborative Filtering Research -- Learning routes within an intelligent on demand transport service -- Graph-based indoor navigation system using BIM data and optimization algorithms -- An Explainable Outlier Detection-based Data Cleaning Approach for Intrusion Detection -- Evaluation of ChatGPT-supported diagnosis, staging and treatment planning for the case of lung cancer -- Why Ethics is important to consider in AI ? -- Combining Stylometric and Sentiment Mining Approaches for Deceptive Opinion Spam Detection -- Sentiment based hybrid deep learning for recommender models -- A Multi-criteria Evaluation Framework For Facial Expression Recognition Models -- Zero-trust management using AI: Untrusting the trusted accounts in social media -- Behavior-driven Indoor Multi-Target UAV-based Detection System: Intelligent RL-based Approach -- A Study on the Relevance of Generic Word Embeddings for Sentence Classification in Hepatic Surgery -- Clustering analysis of metered Arabic poetry compositions -- AraPunc: Arabic Punctuation Restoration Using Transformers -- Analogical Text Mining: Application to Arabic Text Summarization and Classification -- What does KnowBert-UMLS forget? -- A Medical Chatbot for Tunisian Dialect using a Rule-Based and Machine Learning Approach -- Semantic Knowledge Graphs for Scalable Knowledge Discovery and Acquisition in Public Health -- Lisan: Yemeni, Iraqi, Libyan, and Sudanese Arabic Dialect Corpora with Morphological Annotations -- Offensive Hebrew Corpus and Detection using BERT -- Violent Speech Detection in Educational Environments -- A computer vision approach to calculate diameter, volume, velocity and flow rate of bubble leaks in offshore wells -- 3D Facial Expression Recognition Using Spiral Convolutions and Transformers -- BERTImages for Diabetic Retinopathy Classification -- PyTorch and CEDR: Enabling Deployment of Machine Learning Models on Heterogeneous Computing Systems -- A Thermographic Time Series Approach for Evaluating the Breast Cancer Treatment -- Enhancing Anomaly Detection in Videos using a Combined YOLO and a VGG GRU Approach -- Seismic Fault Segmentation Using Unsupervised Domain Adaptation -- Quality Evaluation of Tone Mapping HDR Omnidirectional Image with Multi-regions and Multi-levels -- A Novel Rule-Based Skin Detection Method using Principal Component Analysis-Based Dimensionality Reduction and Individual Contribution on Principal Components -+- ConvMixer-UNet: A Lightweight Network for Breast Lesion Segmentation in Ultrasound Images -- Driving Perception in Challenging Road Scenarios: An Empirical Study -- Segmentation of skin layers in ultrasound images using a crowdsourcing and deep learning-based system -- Enhancing LiDAR Semantic Segmentation Using Model Soups -- Deep Face Recognition based on an Optimized Deep Neural Network using ZFNet -- Towards Hybrid Predictive Maintenance for Aircraft Engine: Embracing an Ontological-Data Approach -- Detection of Network Intrusions Using Anomaly Detection -- Arabic Dialect Identification: Experimenting Pre-trained Models and Tools on Country-level Datasets -- English-Arabic Text Translation and Abstractive Summarization Using Transformers -- Fine Tuning of large language Models for Arabic Language -- A New Hybrid Cipher based on Prime Numbers Generation Complexity: Application in Securing 5G Networks -- Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures -- Innovative Routing Solutions: Centralized Hypercube Routing Among Multiple Clusters in 5G Networks -- Adaptative Access Management in 5G IoE using Device Fingerprinting: Discourse, Mechanisms, Challenges, and Opportunities -- Adapting the Software Development Life Cycle for Digital Twin Development in Healthcare -- Effective Tool for Reporting and Analyzing Medication Errors -- Developing a Recommender System for Frailty Prevention: Addressing Challenges of Data Collection and User Interface Design -- Introduction of Artificial Intelligence in Healthcare Lectures: An Evaluation -- A machine learning technique for device non-wear detection in children with ADHD -- Performance Evaluation of VANET Statistical Broadcast Protocols for Smart Cities -- Traffic Accident Management System for Intelligent and Sustainable Vehicle Networking -- Enhanced Implementation of Intelligent Transportation Systems (ITS) based on Machine Learning Approaches -- Vision Transformer based Intelligent Parking System for Smart Cities -- Research Trends, Challenges, and Future Directions in Vehicular Networks -- Advances in AI and Drone-based Natural Disaster Management: A Survey -- MAM: Multimodel Attention Mechanism for Social Media Natural Disaster Management Tweet Classification -- Formal Methods for Enhanced Natural Disaster Management -- Using Machine Learning for Earthquakes and Quarry Blasts Discrimination -- An Ensemble-based Neural Network Model for Natural Disaster in 2019 -- Security and Privacy Challenges of Participatory Sensing in Natural Disaster Management -- Deploying Artificial Intelligence for Optimized Flood Forecasting and Mitigation -- Streamlining River Flood Prevention with an Integrated AIoT Framework -- Efficient Approaches for Safeguarding Sensitive Data during Natural Disasters -- Quantum Computing
  • for.
  • DNA Analysis and AI in Genomics --
  • Enhancing Parking Online Reservation with a Recommendation System based on User Preferences: A hybrid Approach -- A System Approach to Detect Medical Errors in Operational Data in Hospitals -- Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation -- Security aspects of full-duplex web interactions and WebSockets -- Towards a novel Data Mining System for Medication Error Management -- The Internet of Things (IoT) Contribution to Natural Disaster Management: Review -- Video saliency detection based on color-contrast, motion and texture distinctiveness model -- A Hybrid Approach for Spatial Information Extraction from Natural Language Text -- Iterated Greedy Algorithms for Combinatorial Optimization: A Systematic Literature Review -- A Disaster Management System Using Cloud Computing -- Search Approach for External Data Sources for Data Warehouse Enrichment in Business Intelligence Context -- An overview of the Image Description Systems in Arabic Language -- A data analysis and processing approach for a POI recommendation system -- Artificial Intelligence Based SysML Block Diagram Extension and Evolution for Product Lines -- Towards an End-to-End Speech Recognition Model for Accurate Quranic Recitation -- Strategies for Optimizing Time Series Visual Data Exploration -- Multiple Emotional Profile Representation for Personalized Information Retrieval Systems -- Securing Biometric Systems by using Perceptual Hashing Techniques -- Zero Trust Engine for IoT Environments -- Intrusion Detection for Additive Manufacturing Systems and Networks.
  • AICCSA conference covers all contemporary areas in computer systems and applications, and hence it is an established international forum for leading researchers and practitioners in these important and rapidly changing disciplines The main tracks are Track 1 Ubiquitous, Parallel and Distributed Computing (including cloud, IoT, network, sensors, blockchain technologies) Track 2 Security, Privacy, and Trust Track 3 Data science, knowledge engineering, and ontologies (including Information Retrieval, Big Data, Databases and Knowledge Systems) Track 4 Artificial Intelligence & Cognitive Systems Track 5 Natural Language Processing Track 6 Multimedia, Computer Vision, and Image Processing.
  • Description based on publisher supplied metadata and other sources.
Sprache
Identifikatoren
ISBN: 979-83-503-1943-9
Titel-ID: 9925174564306463
Format
1 online resource
Schlagworte
Artificial intelligence, Image processing