Default Cover Image

2019 International Conference on Advances in the Emerging Computing Technologies (AECT)

Feb. 10 2020 to Feb. 10 2020

Al Madinah Al Munawwarah, Saudi Arabia

ISBN: 978-1-7281-4452-8

Table of Contents

Copyright PageFreely available from IEEE.pp. i-i
ProgramFreely available from IEEE.pp. i-iii
Table of ContentsFreely available from IEEE.pp. i-iv
CommitteesFreely available from IEEE.pp. i-i
Tree-Based Bagging and Boosting Algorithms for Proactive Invoice ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Fog Computing for Leak Detection in On-shore Transmission PipelinesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Supervised Topic Modeling Using Word Embedding with Machine Learning TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Formal Approach To Validate Block-ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Roadmap for Security-as-a-Service CRAN in 5G NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Progression towards an e-Management Centralized Blood Donation System in Saudi ArabiaFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Novel Deep Learning Framework for Intrusion Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Novel Multi-Chaos Based Compressive Sensing Encryption TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Structural Equation Modeling for Acceptance of Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An Overview of Privacy Issues in IoT EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Internet of Things Security Assessment in Healthcare EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Drive-By Road Condition Assessment Using Internet of Things TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A R2N2 Approach For Cardiac Behavior Forecast on Non-Trending Big HealthCare DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Automatic Cell Phone Detection in Large Volume of Baggage ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Localization Error Computation for RSSI Based Positioning System in VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Medical Imaging for the Detection of Tuberculosis Using Chest Radio GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Location Dependent Channel Characteristics for Implantable DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
IoT for Smart ParkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
High Performance Computing for Detecting Complex Diseases using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Skin Lesions Identification Using Deep Convolutional Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Short Term Load Forecasting on PRECON DatasetFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Computerised Segmentation of Medical Images using Neural Networks and GLCMFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Wearable Millimeter Wave MIMO Antenna Design For High Frequency ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Linking the Present and Past in Virtual Worlds: A Case Study of Development and NavigationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Stealth assessment in serious games to improve OO learning outcomesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
On the Implementation of a Secure Email System with ID-based EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Utilizing Graph Database for Inferring Domain-Disease AssociationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Towards Creating Fair Classification Models in Reality Mining Using Data Resampling TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Big Data Driven Secure IoT Analytics with Trusted Execution EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Modified Planar Rectangular Antenna Array for Wideband 5G MIMO ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
High Performance Big Data Graph Analytics Leveraging Near Memory SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Attribute Rule performance in Data Mining for Software Deformity Prophecy Datasets ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Secure Online Banking With BiometricsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Iris segmentation techniques to recognize the behavior of a vigilant driverFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Transparent and Trusted Property Registration System on Permissioned BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Language Independent Sentiment AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Optimum Placement of Conformal Antenna Array Based on Path Loss ProfileFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Performance Evaluation of Ad Hoc Routing Protocols in (FANETs)Full-text access may be available. Sign in or learn about subscription options.pp. 1-6
Smart System for Recognizing Daily Human Activities Based on Wrist IMU SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Automatic Breast Cancer Classification from Histopathological ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Permissioned Blockchain-Based Security for SDN in IoT Cloud NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An Agile Holistic Framework to Support Teachers in Pedagogical Gamification DesignFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Software Bug Prediction Employing Feature Selection and Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Showing 75 out of 75