CATA2022: Volume Information

Proceedings of 37th International Conference on Computers and Their Applications

16 articles159 pagesPublished: March 18, 2022

Papers

Narayan C. Debnath, Shreya Banerjee, Giau Ung Van, Phat Tat Quang and Dai Nguyen Thanh
1-10
Thitivatr Patanasakpinyo, Natcha Chen, Natthikarn Singsornsri and Nattapach Kanchanaporn
11-20
Md Jakir Hossain Molla, Md Obaidullah Sk, Parveen Ahmed Alam, Narayan Debnath and Soumya Sen
21-31
Madhu Kumari, Sugyan Kumar Mishra, Narayan C. Debnath and Anirban Sarkar
32-41
Hongkai Chen and Mohammad Hossain
42-52
Bradford Towle Jr. and Gabrielle Tristani
53-62
Logan Day, Tirthankar Ghosh, Sikha Bagui and Subhash Bagui
63-71
Sruthi Rachamalla and Henry Hexmoor
72-81
Ayushi Vadwala and Ying Jin
82-91
Melissa Schneider, Md Minhaz Chowdhury and Shadman Latif
92-101
Logan Smith, Md Minhaz Chowdhury and Shadman Latif
102-111
Ian Macedo Maiwald Santos, Luciana de Oliveira Rech and Ricardo Moraes
112-121
Luka Daoud and Hingkwan Huen
122-130
Namuunbadralt Zolboot, Quinn Johnson, Dakun Shen and Alexander Redei
131-140
Christopher Lewis, Sven Diaz-Juarez, Steven Anbro, Alison Szarko, Ramona Houmanfar, Laura Crosswell, Michelle Rebaleati, Luka Starmer and Frederick Harris
141-149
Aishwarya Gouru and Shan Suthaharan
150-159

Keyphrases

360 video, active database system, AI, Apps, AR, Artificial Intelligence, Artificial Neural Network, Augmented Reality, Augmented Reality Requirements, B+ tree, Black Hat, Blockchain, CDSS, Chronological Survey, Coverage area, cryptomining, Driver Safety, Emotion Detection, Emotional frequencies, End-User Development, Entropy Analysis, Ethical Hacking, eye tracking, Fourier transform, Fuzzy Logic, geolocation, Graph Database System, Grey Hat, Hearthstone Battleground Simulator, HMD, Industrial Control System Security, Internet of Things, IoT2, iRobot, JSON Schema, Keyloggers, KPIO, lattice, Location-based Study, machine learning2, Madware, Malware, medical simulation, MIPS, Modbus over TCP/IP, Monte Carlo Tree Search, neural network, NVMe, Ontology, performance evaluation, porting, Process Store (PS), Random Forest, Recruitment, Redundant Area, Rewarding driving, Robot Vacuum, searching algorithm, Self-Encrypting Drive, service model, short text, smart contracts, social media, Software-based encryption, Software Quality Assurance and Testing, Support Vector Machine, text mining, topic modeling, Trigger-Action Programming, Trojan, VR, White Hat.