CNSA 2020 March 27, 2020 to March 28, 2020, Sydney, Australia
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Topic Tracking and Visualization Method using Independent Topic Analysis | Takahiro Nishigaki , Kenta Yamamoto , And Takashi Onoda | In this paper propose a topic tracking and visualization method using Independent Topic Analysis. Independent ... | |
The Impact of AI on the Design of Reception Robot: A Case Study | Nguyen Thinh | Service robots recent attract a lot of attention from the public. Integrating with artificial intelligence ... | |
Two Staged Prediction of Gastric Cancer Patient’s Survival Via Machine Learning Techniques | Peng Liu , Chen Bo Yu , Liuwen Li , And Shumin Fei | Cancer is one of the most common causes of death in the world, while gastric ... | |
Performance Evaluation of Prince Based Glitch PUF With Several Selection Parts | Yusuke Yoshikawa | To enhance the internet of things (IoT) security, lightweight ciphers and physically unclonable functions (PUFs) ... | |
Enhancing Network Forensics with Particle Swarm and Deep Learning: The Particle Deep Framework | Nickolaos Moustafa | With more than 7 billion devices deployed in 2018 and double that number in 2019, ... | |
Attribute-based Encryption of Personal Health Record in Cloud Computing Environment: A Short Review | Yuping Yan , Mohammed Ligeti | Attribute-Based Encryption (ABE) scheme as a new cryptography primitive, shows its advantages in fine-grained access ... | |
Ontology-Based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis | Pavel Mejri | The prediction of an attack is essential for the prevention of potential risk. Therefore, risk ... | |
Energy Assessment Approach during Context Integration in New Generation Ubiquitous Networks | Vinodini Bonde | Newer technological advancements in ubiquitous networking have boosted digital dependency of users. Indispensible role of ... | |
RPDroid: Android Malware Detection using Ranked Permissions | Madan Upadhayay , Ashutosh Sharma , Gourav Arora | The number of malware attacks on Android platform has escalated over the past few years. ... | |
Playing Virtual Musical Drums By Mems 3d Accelerometer Sensor Data And Machine Learning | Shaikh Farhad Hossain , Kazuhisa Hirose , Shigehiko Altaf-ul-amin | In our life, music is a vital entertainment part whose important elements are musical instruments. ... | |
Information Retrieval in Data Science Curricula | Duaa Bukhari | In the past decade, the world has been transformed by the rapidly evolving field of ... | |
The use of Convolutional Neural Network for Malware Classification | Shah Rukh Sajjad , Bi Jiana , Shah Zaib Sajjad | Digital security is confronting an immense risk from malwares or malicious software. In recent years, ... | |
An improved Safety Detection Algorithm Towards Deadlock Avoidance | Momotaz Begum , Omar Faruque , Md. Das | In operating system, the resource allocation to each process is a critical issue, because the ... | |
Entanglement in Shor's Factoring Algorithm | Zhihao Chen , Jianing Tan | Quantum algorithms are well known for their higher efficiency compared to their classical counterparts. However, ... |