


default search action
3rd ICICT 2020: San Jose, CA, USA
- 3rd International Conference on Information and Computer Technologies, ICICT 2020, San Jose, CA, USA, March 9-12, 2020. IEEE 2020, ISBN 978-1-7281-7283-5

- Amma Kazuo:

Partial Scoring of Reordering Tasks Revisited: Linearity Matrix by Excel. 1-6 - Bilal Gonen

, Dipali Sawant:
Significance of Agile Software Development and SQA Powered by Automation. 7-11 - Andre Rabello, Robison Cris Brito, Fábio Favarim, Alfredo Weitzenfeld, Eduardo Todt

:
Mobile System for Optimized Planning to Drone Flight applied to the Precision Agriculture. 12-16 - Nabil Almashfi, Lunjin Lu:

Precise String Domain for Analyzing JavaScript Arrays and Objects. 17-23 - Wafa Qadadeh, Sherief Abdallah

:
An Improved Agile Framework For Implementing Data Science Initiatives in the Government. 24-30 - Weiwei Xie, Mingyan He, Bo Tang:

Data-Enabled Correlation Analysis between Wildfire and Climate using GIS. 31-35 - Giovanni Ortegón Cortázar, Olmer Garcia-Bedoya, José Javier Samper

, Francisco García-Sánchez:
A Case of Use in the Management of Administrative Processes, Control of Procedures and Services to Citizens In E-Government. 36-40 - Aum Patil, Aman Framewala, Faruk Kazi:

Explainability of SMOTE Based Oversampling for Imbalanced Dataset Problems. 41-45 - Amjed Al-Thuhli, Mohammed Al-Badawi:

A Framework to Analyze Social Tagging and Unstructured Data. 46-53 - Hiroki Watanabe, Tomás Malý, Johannes Wallner, Günther Prokop

:
Cluster-Linkage Analysis in Traffic Data Clustering for Development of Advanced Driver Assistance Systems. 54-59 - Kamran Ghane:

Big Data Pipeline with ML-Based and Crowd Sourced Dynamically Created and Maintained Columnar Data Warehouse for Structured and Unstructured Big Data. 60-67 - Peter Bearse, Omar Manejwala, Atif Farid Mohammad, Intisar Rizwan i Haque:

An Initial Feasibility Study to Identify Loneliness Among Mental Health Patients from Clinical Notes. 68-77 - Masanari Kimura

, Masayuki Tanaka:
New Perspective of Interpretability of Deep Neural Networks. 78-85 - Pranjal Ranjan

, Sarvesh Patil, Faruk Kazi:
Improved Generalizability of Deep-Fakes Detection using Transfer Learning Based CNN Framework. 86-90 - Muhammad Hassan Tanveer:

Simulate Forest Trees by Integrating L-System and 3D CAD Files. 91-95 - Heecheon Park, Joshus DeNio, Jeongyun Choi, Hanku Lee:

mpiPython: A Robust Python MPI Binding. 96-101 - Isha Zameer Memon, Shahnawaz Talpur, Sanam Narejo

, Aisha Zahid Junejo
, Fawwad Hassan:
Short-Term Prediction Model for Multi-currency Exchange Using Artificial Neural Network. 102-106 - Rebecca Miao, Zhenyi Yang, Valeriy Gavrishchaka:

Topological Representation of Rare States Using Combination of Persistent Homology and Complexity Measures. 107-113 - Prasenjit Biswas, Sarit Pal, Sunil P. Khatri:

A Mathematical Framework for Exploring Protein Folding Dynamics using Probabilistic Model Checking. 114-123 - Alaa Darabseh, Doyel Pal:

Performance Analysis of Keystroke Dynamics Using Classification Algorithms. 124-130 - Nawar H. Obeidat, Carla Purdy:

Modeling a Smart School Building System Using UML and TLA+. 131-136 - Javier Orlando Pinzon-Arenas

, Robinson Jiménez-Moreno:
Obstacle Detection Using Faster R-CNN Oriented to an Autonomous Feeding Assistance System. 137-142 - Temitope Mapayi, Pius Adewale Owolawi:

Retinal Vascular Network Segmentation Using Adaptive Thresholding Method Based on LSRV. 143-147 - Ajay Koul, Apeksha Koul:

Semantic Segmentation and Contextual Information Based Image Scene Interpretation: A Review. 148-153 - Nawaf Alsrehin, Mu'tasem A. Al-Taamneh:

Face Recognition Techniques using Statistical and Artificial Neural Network: A Comparative Study. 154-159 - Ming Xu, Zihong Tian:

An Image Cipher Based on Latin Cubes. 160-168 - Dipesh Chand, Hasan Ogul:

Content-Based Search in Lecture Video: A Systematic Literature Review. 169-176 - Takayuki Kunieda, Satoru Yamada, Tetsuya Ikeda, Yusuke Kometani, Naka Gotoda, Rihito Yaegashi:

Kagawa University-Type Development Model and Its Practice of Information System for Regional Problem Solution by Open Innovation. 177-182 - Mohammed A. Gharawi, Hashim H. Alneami:

Exploring the Influence of Organizational Context on Cross-boundary Information-Sharing Initiatives: The Case of the Saudi's Government Secure Bus. 183-192 - Toshiro Minami, Yoko Ohura:

An Investigation on Social Relations between University Students from Seat Position Data. 193-197 - Temitope Alade

, Ruel Welch
, Andrew Robinson, Lynn Nichol
:
Mobile Learning for Just-in-Time Knowledge Acquisition in a Workplace Environment. 198-204 - Andrés Alejandro Diaz Toro

, Sixto Enrique Campaña Bastidas
, Eduardo Francisco Caicedo Bravo
:
Methodology to Build a Wearable System for Assisting Blind People in Purposeful Navigation. 205-212 - Filippo Sanfilippo, Claudio Pacchierotti

:
A Low-Cost Multi-modal Auditory-Visual-Tactile Framework for Remote Touch. 213-218 - Mario Barcelo-Valenzuela, Carlos Maximiliano Leal-Pompa, Gerardo Sanchez-Schmitz:

An IT Service Management Methodology for an Electoral Public Institution. 219-223 - Chui Young Yoon:

Analyzing Enterprise Smart Business Capability in a Smart Technology Environment. 224-229 - Duc Son Nguyen

, Quynh Mai Le:
Hacking User in Human-Computer Interaction Design (HCI). 230-234 - Raphael Bravo Dedo, Juan Jesus Cueto Yabar, David Mauricio

:
Inkatán: A Game for Smart TV and Android with Ensemble Interactions. 235-241 - Segundo Moises Toapanta Toapanta, Harold Ariel Mera Caicedo, Bertha Alice Naranjo Sánchez, Luis Enrique Mafla Gallegos

:
Analysis of Security Mechanisms to Mitigate Hacker Attacks to Improve e-Commerce Management in Ecuador. 242-250 - Zhang Chunyong, Xiaojing Meng:

Log Parser with One-to-One Markup. 251-257 - Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos

, Patricio Ordoñez Baldeon, Fabrizio Darío Triviño Triviño:
Blockchain Analysis Applied to a Process for the National Public Data System for Ecuador. 258-265 - Naoki Iijima, Koichiro Amemiya, Jun Ogawa, Hidenobu Miyoshi:

Deciding Backup Location Methods for Distributed Stream Processing System. 266-270 - Sahil Verma

, Akash Sinha
, Prabhat Kumar, Ajay Maitin:
Optimizing Online Shopping using Genetic Algorithm. 271-275 - Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos

, Mario Darío Medina Lara, Javier Gonzalo Ortiz Rojas:
Analysis of New Technologies in Information Security to Mitigate Data Risks in a Public Organization. 276-283 - Dominik Schmelz

, Karl Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, Thomas Grechenig:
Securing the Rights of Data Subjects with Blockchain Technology. 284-288 - Badhrinarayan Malolan, Ankit Parekh, Faruk Kazi:

Explainable Deep-Fake Detection Using Visual Interpretability Methods. 289-293 - Segundo Moisés Toapanta Toapanta, Tatiana Fernanda Prado Quintana, Ma. del Roció Maciel Arellano

, Luis Enrique Mafla Gallegos
:
Hyperledger Technology in Public Organizations in Ecuador. 294-301 - Khaldoon Alshouiliy, Ali AlGhamdi, Dharma P. Agrawal:

AzureML Based Analysis and Prediction Loan Borrowers Creditworthy. 302-306 - Javed Ahmed

, Sule Yildirim
, Mariusz Nowostaki, Raghvendra Ramachandra, Ogerta Elezaj, Mohamad Abomohara
:
GDPR Compliant Consent Driven Data Protection in Online Social Networks: A Blockchain-Based Approach. 307-312 - Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos

, Michael Gerardo Guaman Villalta, Nelson Salomon Mora Saltos:
A Hyperledger Technology Approach to Mitigate the Risks of the Database in Foreign Trade Management. 313-319 - Hoa Cao Van

, Tuan Nguyen Anh
:
Establishing a Graphical Method for Calculation of Raft Thickness in Piled Raft, Pile Group and Raft Foundation. 320-325 - Qianhao Zhai

, Yang Deng, Haoming Zhou, Siling Feng
, Mengxing Huang:
A Decision Model of Taxi Driver Based on Qualitative Analysis. 326-330 - Gilang Maulana Majid

, Anjan Pal
:
Conspiracy and Rumor Correction: Analysis of Social Media Users' Comments. 331-335 - Robison Cris Brito, Carlos Vinícius Ferrareze, Fábio Favarim, Jefferson Tales Oliva

, Eduardo Todt
:
A Novel System for Ammonia Gas Control in Broiler Production Environment. 336-340 - Afzal Hussain Shahid, Maheshwari Prasad Singh, Bishwajit Roy, Aashish Aadarsh:

Coronary Artery Disease Diagnosis Using Feature Selection Based Hybrid Extreme Learning Machine. 341-346 - Syed Faiz Ahmed, M. Hassan Tanveer, Isho James Kiwarkis, Herish Badal Basy:

Design and Controlling of Low-Cost Prosthetic Hand Using Force Sensor. 347-350 - Toshiya Kawato, Masayuki Higashino, Kenichi Takahashi, Takao Kawamura:

Attempt to Utilize Surplus Storage Capacity as Distributed Storage. 351-355 - Tuan Nguyen Anh

:
Analysis of Stress-Strain Behaviours and Stability of the Ground Around the Tunnel in Ho Chi Minh City During the Construction Stages. 356-360 - Bharath Reddy, Richard Fields:

Multiple Anchor Staged Alignment Algorithm - Sensitive (MASAA - S). 361-365 - Hardik B. Jain, Matthew Edwards, Ethan R. Elenberg, Ankit Singh Rawat, Sriram Vishwanath:

Achieving Multi-port Memory Performance on Single-Port Memory with Coding Techniques. 366-375 - Tuan Nguyen Anh

, Dat Nguyen Thanh:
2D Finite Element Analysis for the Application of Deep Soil Mixing Columns for Reinforcement of Soft Ground Surrounding Deep Excavation. 376-379 - Qianhao Zhai

, Xiaoyu Xia, Siling Feng
, Mengxing Huang:
Optimization Design of LQR Controller Based on Improved Whale Optimization Algorithm. 380-384 - Said Varlioglu, Bilal Gonen

, Murat Ozer
, Mehmet F. Bastug
:
Is Cryptojacking Dead After Coinhive Shutdown? 385-389 - Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos

, Bryan Smith Benavides Quimis, Dario Fernando Huilcapi Subia
:
Approach to Mitigate the Cyber-Environment Risks of a Technology Platform. 390-396 - Oluwamayowa Ade Adeleke:

Intrusion Detection: Issues, Problems and Solutions. 397-402 - Daechul Park, Youngeun Cho, Chang-Gun Lee:

Conditionally Optimal Parallelization for Global FP on Multi-core Systems. 403-412 - Matthew McNulty, Houssain Kettani:

On Cybersecurity Education for Non-technical Learners. 413-416 - Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos

, Bryan Eduardo Cisnero Andrade, Maximo Geovani Tandazo Espinoza
:
Analysis to Predict Cybercrime Using Information Technology in a Globalized Environment. 417-423 - Haissam Badih, Benjamin Bond, Julian L. Rrushi:

On Second-Order Detection of Webcam Spyware. 424-431 - Sayyed Maisikeli:

UAE Cybersecurity Perception and Risk Assessments Compared to Other Developed Nations. 432-439 - Kevin Matthe Caramancion

:
An Exploration of Disinformation as a Cybersecurity Threat. 440-444 - Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos

, María José Chévez Morán, Javier Gonzalo Ortiz Rojas:
Analysis of Models of Security to Mitigate the Risks, Vulnerabilities and Threats in a Company of Services of Telecommunications. 445-450 - Tjada Nelson, Houssain Kettani:

Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups. 451-456 - Amr Abdelaziz

, Mahmoud Mandour, Ashraf D. Elbayoumy
, Gamal M. Abdel-Hamid:
Dynamic Channel Allocation Scheme for Handover Calls in Cellular Networks. 457-461 - Maria Zafar, Seerat Iqbal Cheema:

An Efficient Architecture for Network Information Management. 462-468 - Mohsen Guizani, Ala Gouissem, Khalid Abualsaud, Elias Yaacoub, Tamer Khattab

:
Combating Jamming Attacks in Multi-channel IoT Networks Using Game Theory. 469-474 - Muluneh Mekonnen Tulu

, Sultan Feisso, Ronghui Hou, Talha Younas:
CSE: A Content Spreading Efficiency Based Influential Nodes Selection Method in 5G Mobile Social Networks. 475-479 - Van Nguyen, Derek Mohammed, Marwan Omar, Passard Dean:

Net Neutrality Around the Globe: A Survey. 480-488 - Quan Yuan, Quanzhi Qian, Yong Mo, Hao Chen:

Research on Mixed Planning Method of 5G and LTE. 489-493 - Kimo Bumanglag, Houssain Kettani:

On the Impact of DNS Over HTTPS Paradigm on Cyber Systems. 494-499 - S. P. Girija, Rameshwar Rao:

Robust Adaptive AutoRegressive Weighted Constant Modulus Algorithm for Blind Equalization in MIMO-OFDM System. 500-506 - Kuo Yang:

Research and Design of a High Isolation 5G Antenna for Smart Phone. 507-510 - Shiva Paramasivam Karthikeyan, Hayssam El-Razouk:

Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman. 511-519 - Ahmed Kamal, Hisham Dahshan, Ashraf D. Elbayoumy

:
A New Homomorphic Message Authentication Code Scheme for Network Coding. 520-524 - Chandrasekar Vuppalapati, Anitha Ilapakurti, Sharat Kedari, Raja Vuppalapati, Jaya Vuppalapati, Santosh Kedari:

Democratization of AI, Albeit Constrained IoT Devices & Tiny ML, for Creating a Sustainable Food Future. 525-530 - Adenilson Mumbelli, Robison Cris Brito, Vinicius Pegorini

, Luis Felipe Priester:
Low Cost IoT-Based System for Monitoring and Remote Controlling Aviaries. 531-535 - Pablo Pico-Valencia

, Juan A. Holgado-Terriza
, Xavier Quiñónez-Ku
:
A Brief Survey of the Main Internet-Based Approaches. An Outlook from the Internet of Things Perspective. 536-542 - James Hsi-Jen Yeh

, Craig Bartholio, Elyse Shackleton, Levi Costello, Matthew Perera, Kyle Yeh, Chelsea Yeh
:
Environmentally Embedded Internet-of-Things for Secondary and Higher Education. 543-547 - Gokhan Sagirlar, John D. Sheehan, Emanuele Ragnoli:

On the Design of Co-operating Blockchains for IoT. 548-552 - Sriveni Namani, Bilal Gonen

:
Smart Agriculture Based on IoT and Cloud Computing. 553-556

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














