default search action
4th ICICT 2019: London, UK
- Xin-She Yang, R. Simon Sherratt, Nilanjan Dey, Amit Joshi:
Fourth International Congress on Information and Communication Technology - ICICT 2019, London, UK, February 25-26, 2019, Volume 2. Advances in Intelligent Systems and Computing 1027, Springer 2020, ISBN 978-981-32-9342-7 - Youna Jung:
PESOHA: Privacy-Preserving Evaluation System for Online Healthcare Applications. 1-15 - Rita Yi Man Li, Tat Ho Leung:
Computer Vision and Hybrid Reality for Construction Safety Risks: A Pilot Study. 17-22 - Oussama Ghorbel, Hamoud H. Alshammari, Mohammed Aseeri, Radhia Khdhir, Mohamed Abid:
Data Reduction Using NMF for Outlier Detection Method in Wireless Sensor Networks. 23-30 - Ezekiel Uzor Okike, Seamogano Mosanako:
Measuring Customer Satisfaction on Software-Based Products and Services: A Requirements Engineering Perspective. 31-45 - Thai Minh Truong, Cuong Huy Phan, Hoang Van Tran, Long Nhut Duong, Linh Van Nguyen, Toan Thanh Ha:
To Develop a Water Quality Monitoring System for Aquaculture Areas Based on Agent Model. 47-58 - Muhammad Arslan, Christophe Cruz, Dominique Ginhac:
Identifying Intrusions in Dynamic Environments Using Semantic Trajectories and BIM for Worker Safety. 59-67 - Karina A. Gulyaeva, Irina L. Artemieva:
The Ontological Approach in Organic Chemistry Intelligent System Development. 69-78 - Komal Teja Mattupalli, Sriraman Kothuri:
Effective Way of Deriving the Context from a Handwritten Image/Object. 79-88 - Liudmila Babenko, Ilya Pisarev:
E-Voting System Based on Multiple Ballot Casting. 89-97 - Yong Fang, Yijia Xu, Cheng Huang, Liang Liu, Lei Zhang:
Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest. 99-115 - Stefan Marksteiner, Bernhard Jandl-Scherf, Harald Lernbeiß:
Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques. 117-127 - Manon Lisa Sijm, Chelsea Rome Exel, Jan Treur:
Using a Temporal-Causal Network Model for Computational Analysis of the Effect of Social Media Influencers on the Worldwide Interest in Veganism. 129-140 - Ann Nosseir, Ahmed Hamad, Abdelrahman Wahdan:
Detecting Drivers' Fatigue in Different Conditions Using Real-Time Non-intrusive System. 141-151 - Craig S. Wright:
Decentralized Autonomous Corporations. 153-167 - Craig S. Wright:
A Distribution Protocol for Dealerless Secret Distribution. 169-191 - Ahmed M. Mahfouz, Deepak Venugopal, Sajjan G. Shiva:
Comparative Analysis of ML Classifiers for Network Intrusion Detection. 193-207 - Neha Sathe, Anil Hiwale:
Achieving Wellness by Monitoring the Gait Pattern with Behavioral Intervention for Lifestyle Diseases. 209-218 - Hendrik von Kentzinsky, Stefan Wijtsma, Jan Treur:
A Temporal-Causal Modelling Approach to Analyse the Dynamics of Burnout and the Effects of Sleep. 219-232 - Pieke Heijmans, Jip van Stijn, Jan Treur:
Modeling Cultural Segregation of the Queer Community Through an Adaptive Social Network Model. 233-248 - David Bird:
Derivation of a Conceptual Framework to Assess and Mitigate Identified Customer Cybersecurity Risks by Utilizing the Public Cloud. 249-265 - Hussain Al-Aqrabi, Richard Hill, Phil Lane, Hamza Aagela:
Securing Manufacturing Intelligence for the Industrial Internet of Things. 267-282 - Kaisa Lõhmus, Katrin Nyman-Metcalf, Rozha K. Ahmed, Ingrid Pappel, Dirk Draheim:
The Private Sector's Role in e-Government from a Legal Perspective. 283-298 - Thierry Roger Bayala, Sadouanouan Malo, Atsushi Togashi:
Toward an Effective Identification of Tweet Related to Meningitis Based on Supervised Machine Learning. 299-306 - Nhlakanipho C. Fakude, Ayoturi Tosin Akinola, Matthew Olusegun Adigun:
The Effect of Data Transmission and Storage Security Between Device-Cloudlet Communication. 307-319 - Elton Shah Aly, Dustin Terence van der Haar:
Slang-Based Text Sentiment Analysis in Instagram. 321-329 - Ilse Lelieveld, Gert-Jan Storre, Seyed Sahand Mohammadi Ziabari:
A Temporal Cognitive Model of the Influence of Methylphenidate (Ritalin) on Test Anxiety. 331-345 - Sung-Jong Eun, Eun-Young Jung, Hyun Ki Hong, Dong-Kyun Park:
Stroke Diagnosis Algorithm Based on Similarity Analysis. 347-352 - Francesco Colace, Massimo De Santo, Marco Lombardi, Francesco Pascale, Domenico Santaniello, Allan Tucker:
A Multilevel Graph Approach for Predicting Bicycle Usage in London Area. 353-362 - Abdelhak Belhi, Houssem Gasmi, Abdelaziz Bouras, Taha Alfaqheri, Akuha Solomon Aondoakaa, Abdul Hamid Sadka, Sebti Foufou:
Machine Learning and Digital Heritage: The CEPROQHA Project Perspective. 363-374 - George Papageorgiou, Eudokia Balamou, Athanasios Maimaris:
Developing a Business Model for a Smart Pedestrian Network Application. 375-381 - Santosh Kedari, Jaya Shankar Vuppalapati, Anitha Ilapakurti, Sharat Kedari, Rajasekar Vuppalapati, Chandrasekar Vuppalapati:
The Role of Supervised Climate Data Models and Dairy IoT Edge Devices in Democratizing Artificial Intelligence to Small Scale Dairy Farmers Worldwide. 383-404 - Swapnika Reddy Putta, Abdullah Abuhussein, Faisal Alsubaei, Sajjan G. Shiva, Saleh Atiewi:
Security Benchmarks for Wearable Medical Things: Stakeholders-Centric Approach. 405-418 - Chandrashekhar Pantina, Prabhakaran Malini, Georg Gutjahr, Raghu Raman, Prema Nedungadi:
Teacher Perception of OLabs Pedagogy. 419-426 - Mithun Haridas, Nirmala Vasudevan, Georg Gutjahr, Raghu Raman, Prema Nedungadi:
Comparing English and Malayalam Spelling Errors of Children using a Bilingual Screening Tool. 427-436 - Ganeshayya Ishwarayya Shidaganti, S. Prakash, K. G. Srinivasa:
Curriculum Enrichment in Empowering "Corporate-Ready" Individuals. 437-447 - Segundo Moisés Toapanta Toapanta, Felix Gustavo Mendoza Quimi, Rubén Franklin Reina Salazar, Luis Enrique Mafla Gallegos:
Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City. 449-461 - Segundo Moisés Toapanta Toapanta, Johan Eduardo Aguilar Piguave, Luis Enrique Mafla Gallegos:
Analysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador. 463-473 - Sanjay Gaur, Darshanaben D. Pandya, Manish Kumar Sharma:
Applied N F Interpolation Method for Recover Randomly Missing Values in Data Mining. 475-485 - Sanjay Gaur, Hemant Sahu, Kulvinder Singh:
ICT-Enabled Business Promotion Approach Through Search Engine Optimization. 487-495 - Wafa Waheeda Syed, Somaya Al-Máadeed:
Infrared Versus Visible Image Matching for Multispectral Face Recognition. 497-507 - Drishty Sobnath, Olufemi Isiaq, Ikram Ur Rehman, Moustafa M. Nasralla:
Using Machine Learning Advances to Unravel Patterns in Subject Areas and Performances of University Students with Special Educational Needs and Disabilities (MALSEND): A Conceptual Approach. 509-517 - Karim Hammoudi, Mohammed AbuTaha, Halim Benhabiles, Mahmoud Melkemi, Féryal Windal, Safwan El Assad, Audrey Queudet:
Image-Based Ciphering of Video Streams and Object Recognition for Urban and Vehicular Surveillance Services. 519-527 - Suparna Dutta, Niket Mehta:
Augmented Reality - A Tool for Mediated Communication: A Case Study of Teen Pregnancy in Contexts like India. 529-536
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.