NCS2019 2020 Nov. 23, 2019 to Nov. 24, 2019, Zurich, Switzerland
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Finding Maximal Localizable Region in Wireless Sensor Networks by Merging Rigid Clusters | Saroja Kanchi | Localization of Wireless Sensor Network (WSN) is the problem of finding the geo-locations of sensors ... | |
Toward A Framework to Implement A Master Data Management under SOA | Chafika Benkherourou | Master Data Management (MDM) and Service Oriented Architecture (SOA) are gaining increased prominence within the ... | |
Cognitive Cities an Architectural Framework for the Cities of the Future | Cristiana Carvalho1 , Filipe Cabral Pinto1 , Isabel Borges1 , Gonçalo Oliveira | Digital transformation has changed management models in cities. The use of tools supported by information ... | |
Anomaly-based Intrusion Detection for Hyper Large Industrial IoT Networks | Mohammad Rmayti , Alexis Polvé | During the last decade, the world witnessed a significant transformation in manufacturing policies called Industry ... | |
Prediction and Causality Analysis of Churn Using Deep Learning | Muzaffar Shah , Darshan Adiga , Shabir Vyeth | In almost every type of business a retention stage is very important in customer life ... | |
A Novel Machine Learning System for Sentiment Analysis and Extraction | Osama Alokaily | The huge volume of online reviews makes it difficult for a human to process and ... | |
Fuzzy logic for E-recruitment | Abdessamad Ouznini , Youssef Fakir , Mohamed Fakir , Bouzekri Moustaid | In this study, we create a job matching system that articulate over semantic web technologies ... | |
A Comparison of Unsupervised Anomaly Detection Methods on a Unified Host and Network Dataset | Donald Brown , Catherine Beazley , Karan Gadiya , Rakesh Ravi , David Roden , Boda Ye , Brendan Abraham , And Malathi Veeraraghavan | Systems administrators need to efficiently detect and respond to cybersecurity breaches to protect their network. ... | |
An Artificial Neural Network Approach for the Classification of Human Lower Back Pain | Shubham Mayorga | In today’s world, the problem of lower back pain is one of the fastest growing ... | |
Prediction of Workpiece Quality: An Application of Machine Learning in Manufacturing Industry | Günther Schuh , Paul Scholz , Sebastian Schorr , Durmus Harman , Matthias Möller , Jörg Heib , Dirk Bähre | A significant amount of data is generated and could be utilized in order to improve ... | |
Automated Music Making with Recurrent Neural Network | Yao Lu , You Peng | Today, the growing market of entertainment has placed a higher demand for music. Quality music ... | |
In Hindsight: A Smooth Reward for Steady Exploration | Hadi Schmidt-thieme | In classical Q-learning, the objective is to maximize the sum of discounted rewards through iteratively ... | |
A Hybrid Model for Evacuation Simulation and Efficiency Optimization in Large Complex Buildings | Hao Yuan , Guo Yu , Yifan Ma , Jieneng Chen , Xiongda Chen | Traditional methods for simulating the flow of people includes the Cellular Automaton, artificial potential field, ... | |
Quality Model to the Adaptive Guidance | Hamid Oussala | The need for adaptive guidance systems is now recognized for all software development processes. The ... | |
Collaborative and Fast Decryption Using Fog Computing and A Hidden Access Policy | Ahmed Saidi , Omar Amira | Nowadays, IOT (Internet Of Things) devices are everywhere and are used in many domains including ... | |
Managed Cloud Operations | Andrei Carabas | In today’s fast-moving world, advances in technology occur at an alarming rate. Keeping up is ... | |
Semantic Document Classification based on Strategies of Semantic Similarity Computation and Correlation Analysis | Shuo Yang , Ran Wei , Hengliang Du | Document (text) classification is a common method in ebusiness, facilitating users in the tasks such ... | |
Automated Generation of Computer Graded Unit Testing-Based Programming Assessments for Education | Sébastien Moffarts | Automatic assessment of code, in particular to support education, is an important feature that several ... | |
SFERANET: Automatic Generation of Football Highlights | Vincenzo Scotti , Licia Tedesco | We present a methodology for automatic generation of football match “highlights”, relying on the commentator ... | |
Automation Regression Testing for SAS.AM Website | Harutyun Ali | This research study is focused on a company which operated in online shopping. The company ... | |
Secure and Privacy-aware Data Collection Architecture Approach in Fog Node Based Distributed IoT Environment | Moussa Konstantas | In the era of Internet of Thing, data are collected from heterogeneous wireless protocols such ... | |
An Intelligent Mobile Application to Manage College Database and Recommendation Using Data Mining | Yu Zhang , Yixian Qi , Qi Lu | College application is critical and complicated task for high school students. Generally speaking, one student ... | |
TRIT: A Robust Tracker Based on Triplet Network | Peng Cai | In this paper, a target tracking algorithm, TriT(Triplet Network Based Tracker), based on Triplet network ... | |
Customized Garment Fashion Recommendation System Using Data Mining Techniques | Shukla Sharma , Ludovic Koeh , Pascal Bruniaux , Xianyi Zeng | The fashion industry has moved so fast in a few years and expected to grow ... | |
Abstractive text summarization using Transformer based deep learning | Xin Liu | Extractive and abstractive are two main text summarization techniques, unlike previous works which treat them ... | |
Motion estimation from noisy image sequences using new frequency weighting functions | El Ismail | Motion estimation is a signal-matching technique. It is a key component of target tracking, medical ... | |
Split Multi-stage Vector Quantization Based Steganography for Secure Wideband Speech Coder | Merouane Laskar | Speech steganography is a technique of covert communication which conveys secret speech hidden in cover ... | |
Segmentation of Single and Overlapping Leaves by Extracting Appropriate Contours | Rafflesia Debnath | Leaf detection and segmentation is a complex image segmentation problem as leaves are most often ... | |
Lane Detection for Prototype Autonomous Vehicle | Sertap Kamçi , Dogukan Aydin | Unmanned vehicle technologies are an area of great interest in theory and practice today. These ... | |
Nature-inspired Meta-heuristic Optimization Algorithms: Grey Wolf Optimization, Dolphin Swarm Optimization, And Bacterial Foraging Optimization | Büsra Rümeysa Mete , Dogukan Arslan | In mathematical sense, optimization can be defined as minimizing or maximizing a function. Meta-Heuristic Optimization ... | |
Lifetime Extension of Ad Hoc Wireless Network with Shadowing Effects | Amir J. Majid | Lifetime extension algorithm is implemented on an ad hoc wireless networks with shadowing effects, and ... | |
Measurement and Characterization of the Stationary Noise in Narrowband Power Line Communication | Raja Attia | Understanding the interference scenario in power lines network is a key step to characterize the ... | |
Token Bucket-based Throughput Constraining in Cross-layer Schedulers | Jeremy Blondia | In this paper we consider upper and lower constraining users' service rates in a slotted, ... | |
SS EMS :A Smart and Secure Framework of Energy Management System | Jaspreet Kalra | Nowadays every infrastructure work smartly as smart home, smart industry, smart academia etc. They use ... | |
Methodology to Evaluate WSN Simulators: Focusing on Energy Consumption Awareness | Michel Bakni , Luis Chacon , Yudith Cardinale , Guillaume Terrasson , And Octavian Curea | Nowadays, there exists a large number of available network simulators, that dier in their design, ... | |
Design a simple printed antenna with DGS structure for UWB/SWB applications | Tarek Messatfa , Fouad Chebbara , Abdelkarim Belhedri , And Abderrahim Annou | In this paper a circular microstrip patch antenna with Defected Ground Structure (DGS) has been ... | |
A Fair Electronic Voting System Using Blockchain | Changhyun Lee | E-government systems have ensured reliable data and prevented the forgery and modulation of that information, ... | |
Public-Key Based Authentication Architecture for IoT Devices Using PUF | Haji Akhundov , Erik Sluis , Said Taouil | Nowadays, Internet of Things (IoT) is a trending topic in the computing world. Notably, IoT ... | |
Securing Digital Signature Algorithm Against Side Channel Attacks | Mohamed. Ahmed , S. Shalaby | Many software implementations for the schemes used for public key cryptosystems, of which elliptic curve ... | |
Cognizance of data to action techniques for IoT environments | Pushpinder Kaur Chouhan , Md Israfil Biswas , Naveed Khan , Chris Nugent , And Philip Morrow | The Internet of Things (IoT) is a system of interrelated things (devices, machines, objects, animals, ... | |
Security Framework for IoT Devices Against Cyber-attacks | Aliya Lebda | Internet of Things (IoTs) is the interconnection of heterogeneous smart devices through the Internet with ... | |
Layman’s Understanding Approach to the Internet of Things (IoT) Concepts and Applications | Rajeev Kanth , Tuomas Korpi , Arto Toppinen , Kimmo Myllymäki , Jatin Chaudhary , Jukka Heikkonen | The term “Internet of Things (IoT)” and its ecosystem is expanding very rapidly, and therefore, ... | |
Hybrid Application Layer Protocol Design for IoT Environments | Erdal Erdem | One of the important factors affecting communication performance in the Internet of Things is the ... |