CNSA 2020 March 27, 2020 to March 28, 2020, Sydney, Australia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Topic Tracking and Visualization Method using Independent Topic Analysis Takahiro Nishigaki , Kenta Yamamoto , And Takashi Onoda In this paper propose a topic tracking and visualization method using Independent Topic Analysis. Independent ...
The Impact of AI on the Design of Reception Robot: A Case Study Nguyen Thinh Service robots recent attract a lot of attention from the public. Integrating with artificial intelligence ...
Two Staged Prediction of Gastric Cancer Patient’s Survival Via Machine Learning Techniques Peng Liu , Chen Bo Yu , Liuwen Li , And Shumin Fei Cancer is one of the most common causes of death in the world, while gastric ...
Performance Evaluation of Prince Based Glitch PUF With Several Selection Parts Yusuke Yoshikawa To enhance the internet of things (IoT) security, lightweight ciphers and physically unclonable functions (PUFs) ...
Enhancing Network Forensics with Particle Swarm and Deep Learning: The Particle Deep Framework Nickolaos Moustafa With more than 7 billion devices deployed in 2018 and double that number in 2019, ...
Attribute-based Encryption of Personal Health Record in Cloud Computing Environment: A Short Review Yuping Yan , Mohammed Ligeti Attribute-Based Encryption (ABE) scheme as a new cryptography primitive, shows its advantages in fine-grained access ...
Ontology-Based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis Pavel Mejri The prediction of an attack is essential for the prevention of potential risk. Therefore, risk ...
Energy Assessment Approach during Context Integration in New Generation Ubiquitous Networks Vinodini Bonde Newer technological advancements in ubiquitous networking have boosted digital dependency of users. Indispensible role of ...
RPDroid: Android Malware Detection using Ranked Permissions Madan Upadhayay , Ashutosh Sharma , Gourav Arora The number of malware attacks on Android platform has escalated over the past few years. ...
Playing Virtual Musical Drums By Mems 3d Accelerometer Sensor Data And Machine Learning Shaikh Farhad Hossain , Kazuhisa Hirose , Shigehiko Altaf-ul-amin In our life, music is a vital entertainment part whose important elements are musical instruments. ...
Information Retrieval in Data Science Curricula Duaa Bukhari In the past decade, the world has been transformed by the rapidly evolving field of ...
The use of Convolutional Neural Network for Malware Classification Shah Rukh Sajjad , Bi Jiana , Shah Zaib Sajjad Digital security is confronting an immense risk from malwares or malicious software. In recent years, ...
An improved Safety Detection Algorithm Towards Deadlock Avoidance Momotaz Begum , Omar Faruque , Md. Das In operating system, the resource allocation to each process is a critical issue, because the ...
Entanglement in Shor's Factoring Algorithm Zhihao Chen , Jianing Tan Quantum algorithms are well known for their higher efficiency compared to their classical counterparts. However, ...