Proceedings of 35th International Conference on Computers and Their Applications

Editors: Gordon Lee and Ying Jin
41 articles402 pagesPublished: March 9, 2020


Session MA2: Visualization and Image Processing
Pages 1-12
Pages 13-21
Pages 22-31
Pages 32-39
Session MP1: Cybersecurity, Threat Analytics and Internet Censorship Issues
Pages 40-47
Pages 48-59
Pages 60-68
Pages 69-79
Session MP2: Computing in Business and Urban Planning
Pages 80-89
Pages 90-97
Pages 98-111
Pages 112-121
Session MP3: Database Management and Operating Systems
Pages 122-133
Pages 134-140
Pages 141-150
Pages 151-160
Session MP4: Algorithms and Methods in Computing
Pages 161-169
Pages 170-179
Pages 180-186
Pages 187-196
Pages 197-205
Session TA2: Neural Networks
Pages 206-213
Pages 214-223
Pages 224-229
Pages 230-241
Session TP2: Software Engineering Applications
Pages 242-255
Pages 256-263
Pages 264-276
Pages 277-286
Session TP3: Computing Applications
Pages 287-296
Pages 297-306
Pages 307-316
Pages 317-326
Session WA1: Performance Issues in Computing
Pages 327-333
Pages 334-344
Pages 345-354
Pages 355-361
Session WA2: Enhancing the Human Condition through Computing
Pages 362-371
Pages 372-382
Pages 383-392
Pages 393-402


3D reconstruction, 3DHOG, Active Rule, adaptive system, Address Verification, Advanced Driver Assistance Systems, Age estimation, algorithm, ANSYS, Anti-Censorship, Architecture-Driven Modernization, Artificial Intelligence2, Assignment, Bare Machine Computing, bare PC, Binary Transformation Methodology, Biometrics, block, Business Intelligence, Capsule Networks, censorship, cerebral aneurysm, Channel-matched, cheating, Classification2, classification algorithms, Classifier, clinical data, cluster, Clustering, CNN, code analysis, Cognitive score, collaboration, Computational Fluid Dynamics, Concentration degree, Convolutional Neural Network, Convolutional Neural Networks, course, cultural heritage, cultural tourism, Cybersecurity, data analysis, Data Mining/Knowledge Discovery, database, Definitive Screening Design, dense substructure, density-based clustering, depth map, Dimension reduction techniques, Disease monitoring and surveillance, Disease outbreak detection, Django application, Driver Yawning, Drivers Fatigue, EEG signal, email spam, Emotions, Energy Forecasting, environmental data, ethics, Evasion Attack, execution environment, facial detection, Facial Landmark Detection, Fatigue Prediction, foreign metal removal, Friend suggestion, Fuzzy Petri nets, Geohash, Geometry computing, GIS, Google Trends, graph, Graph Database System, Graph Dimensionality reduction, graph theory, graphics, Handwriting Recognition, Hemodynamic Data, hierarchical clustering, homework, Human-Computer Visualization, image processing, image semantics, imbalance data, indicators, informal sector, Inspection, interactive exhibit, Internet, Intrusion Detection, IoT, JMP, Kinect, learner classification, LiDAR, lithium battery, LSTM, machine learning6, machine learning fatigue prediction, magnetic separator, magnetostatic, Medical Systems, metrics, Middle East, Model Driven Architecture, Model-Driven Engineering, modeling, modeling and simulation2, Morphological Data, multidimensional indexing, Multilayer neural network, Multiplayer, multiuser systems, Networking, networks, neural network2, Non-destructive testing (NDT), Non-ordered Discrete Data Space, OFDM, OSN, Overlapping classes, oversampling algorithms, pavement crack, personalised learning, Petri nets2, Pipeline inspection, point cloud, poisoning attack, polarized weight, Proxy, quality model, quiz, real-time, Recommender System, Reliability, reverse engineering, Routing Protocol, scalable cloud native platform, second contour, Security2, self-driving cars, Similarity in Images, simulation, Smart City, Smart Ecosystems, SNA, SOC Estimation, software comprehension, Software Engineering, Software Engineering Management, software evolution, Software Modernization, Software Productivity, SOH diagnosis, Spam filter, spatial visualization, statistics, STEAMS, Stroke, Subarachnoid Hemorrhage, Syllabus, team science, text processing, Threats, Time Petri nets, Triads, Trivial Operations, Trust, UI Error, Undersampling Algorithms, Underwater channel, Underwater sensor network (UWSN), update, urban fabric, user interface, Utility loss, Virtual Reality, visualization, voice, Voice in Online Learning, Vulnerabilities, VZ, web application, Wireless Sensor Network, word segmentation, XGBoost regression., zero-skipping