CATA 2019: Volume Information

Proceedings of 34th International Conference on Computers and Their Applications

Editors: Gordon Lee and Ying Jin
51 articles483 pagesPublished: March 13, 2019

Papers

Session M-A2: Computers in Education:
Tamer Aldwairi
1-7
Samuel Delaney, Dwight Egbert and Frederick C. Harris Jr
8-16
Andrew Munoz, Christopher Lewis, Nicholas Bolling, William Zandbergen, Connor Scully-Allison, Vinh Le, Sergiu Dascalu and Benjamin Brown
17-26
Mohamed Shenify, Hisham Al-Mubaid, Sultan Aljahdali and Abdulaziz Alangari
27-35
Session M-P1: Computational Issues:
Luka Daoud, Fady Hussein and Nader Rafla
36-44
Mohammad Hossain and Sameer Abufardeh
45-54
Thitivatr Patanasakpinyo
55-64
Ying Jin and Krishna Kaja
65-74
Session M-P2: Algorithms I:
Ana Maria D'Azevedo Breda and José Manuel Dos Santos Dos Santos
75-82
Michael Fischer and Jonathan Backens
83-92
Yijie Han, Mishra Sneha and Md Usman Gani Syed
93-98
Hussain Albarakati, Reda Ammar and Raafat Elfouly
99-106
Session M-P3: Computer Security:
Salman Faizi and Shawon Rahman
107-116
Thomas Le, William Mitchell and Behnam Arad
117-126
Christopher Chew and Vimal Kumar
127-136
Tirthankar Ghosh, Eman El-Sheikh and Wasseem Jammal
137-143
Cheng-Ying Yang, Hsin-Ying Liang and Pin-Yen Huang Huang
144-154
Session M-P4: Programming and Software Engineering:
Nabil Almashfi and Lunjin Lu
155-167
Lifeng Liu, Meilin Liu and Chongjun Wang
168-179
Aakanksha Rastogi and Kendall Nygard
180-190
Chaney Courtney and Mitchell Neilsen
191-202
Randy Appleton, Ben Slater, Connor Laitinen, Luke Ammel and Cody Malnor
203-209
Session T-A2: Computers in Healthcare:
Kasi Periyasamy and Saleh Alsyefi
210-218
Francisca Fonseca, Hugo Peixoto, Jorge Braga, José Machado and António Abelha
219-224
Daichi Naito, Ryo Hatano and Hiroyuki Nishiyama
225-235
Mohammad Owrang Ojaboni, Yasmine Kanaan and Robert Dewitty Jr
236-246
Session T-P1: Visualization:
Thitivatr Patanasakpinyo, Georgi Batinov, Kofi Whitney, Adel Sulaiman and Les Miller
247-256
Broday Walker and Tina Johnson
257-264
Marcos Lopez, Terry Griffin, Kevin Ellis, Anthony Enem and Christopher Duhan
265-270
Jay Woo, Andrew Frost, Tyler Goffinet, Vinh Le, Connor Scully-Allison, Chase Carthen and Sergiu Dascalu
271-281
Session T-P2: Algorithms II:
Abdullah Al-Shoshan
282-291
Antoine Bossard and Keiichi Kaneko
292-300
Ka Cheok, Kiran Iyengar and Sami Oweis
301-309
Yusuke Ono, Ryo Hatano, Hayato Ohwada and Hiroyuki Nishiyama
310-316
Session T-P3: Special Session on Software Engineering Applications:
Ziping Liu and Bidyut Gupta
317-324
Dustin Ginn, Ilhyun Lee and Haesun Lee
325-335
Giridhar Maji, Sharmistha Mandal, Narayan Debnath and Soumya Sen
336-344
Pradeep Kumar Singh, Pijush Kanti Dutta Pramanik, Narayan C. Debnath and Prasenjit Choudhury
345-355
Session T-P4: Cloud Computing:
Salman Faizi and Shawon Rahman
356-367
Kasumi Kato, Atsuko Takefusa, Hidemoto Nakada and Masato Oguchi
368-377
Maryam Alruwaythi, Krishna Kambhampaty and Kendall E. Nygard
378-386
Mohammed O. Alannsary and Yasser M. Hausawi
387-396
Kawthar Karkouda, Ahlem Nabli and Faiez Gargouri
397-406
Session W-A1: Computers in Manufacturing and Business:
Julian Rogers and Hormoz Zareh
407-417
Roberto Rosas-Romero and Juan-Pablo Medina-Ochoa
418-427
Takashi Ohnishi, Takashi Okamoto and Keiichi Watanuki
428-437
Faryar Etesami, Christopher Mullens, Ramsey Sahli and Trey Webb
438-443
Session W-A2: Applications:
Ana Farhat, Kyle Hagen, Ka C Cheok and Balaji Boominathan
444-453
Ali Rahim Taleqani, Raj Bridgelall, Jill Hough and Kendall Nygard
454-463
Henry Okonofua, Shawon Rahman and Reni Ivanova
464-474
Vasu Saluja, Minni Jain and Prakarsh Yadav
475-483

Keyphrases

3-D printing, 3D printing, ABS, abstract interpretation, abstract syntax tree, Acceleration data, ACL Authentication, Additive Manufacturing2, Address Verification, Advanced Encryption Standard, AES, agent-based modeling, Agile Methods, Aircraft wing, Android, anomaly detection, Apache Kafka, Apache Spark, application development, Architecture, archive, artificial financial predictors, back-stepping control, behavior, Behaviour, behaviour-based detection, Biological Software, Botnet Detection, breast cancer, CANFIS, CDR, Chinese, CIS relationship with other computing disciplines, Cloud2, Cloud Computing3, Cloud Security2, Cloud Service Provider Selection, Clustering, code, Cognitive Radio Networks, collaborative, Command Line Interface, communication, compiler, Complexity., Composite, Computation Tree Logic, computational biology, Computer Information Systems curriculum, Computer Networks, Computer Science Education, conflict resolution, Contamination, cooperative communication, CTA mapping, Cyber Security, Cybersecurity, Data Communications, Data Encryption, Data Mining, Data Security, Data Warehouse, database, database audit, deadlock, deadlock detection, Delivery Model, demand, Design, Design Science, distance measure, distributed stream processing, Domain Generation Algorithm, driving, Drowsy, Dynamic Spectrum Access, e-commerce, EEG, Electronic Brake System (EBS), Electronic Maternity Records, emergency, ethnicity, eXtensible Access Control Markup Language, facial expressions, FDM, File Entropy, File Monitoring, filtering, financial time series, finite element analysis, FPGA., Framework security, Genius, GeoGebra., GIS, Global Position Data, glyph, GPGPU, Graph Database System, Healthcare social network, Hidden Markov Models, High-Level Synthesis, HLS, HTC Vive, HTTP/2.0, Human Computer Interaction, Human Computer Interaction (HCI), image processing, incident tracking, Inductive Logic Programming, Information Extraction, information representation, Information Security Risk Management, Injection molding, Integrated Development Environment, Integrity, intelligent parking, Intelligent Transportation Systems, Intrusion Detection, IoT, IS risk, IT leadership, JavaScript, K-means clustering, kanji, kinematics, leader-follower platoon, Leadership Style, locomotion, logogram, Lyapunov stability, Lyrics Database, machine learning3, magnet, malware detection, mHealth, Minkowski distance, mobile development, model checking, Multi Layer Perceptron, Multipath., music recommendation, musicology, MusiXmatch, Natural Language Processing, NetLogo, network, Network Security, neuro-fuzzy based identification, non-stationary signal, null pointer exception, octagon domain, Optimization, Oracle® database, parallel algorithms, parking lot occupancy, Personal Health Records, personalized recommendation, physical layer security, polyhedron model, prediction, Prediction of Event, prefecthing web requests, Prefetching, Privacy, Process-Resource Graph, prognosis, Progressive Web Apps, projectile motion, pTree., Ransomware, Rapid Tooling, Raspberry Pi, ray, real-time, Real-Time Constraints, Recommendation Systems, Regression, relay assignment, removal, Rendezvous Algorithm, reporting, Reputation, Resource Allocation Graph, reuse, risk management, road impact factor, road quality, route planning, RStudio, Saudi Arabia, secrecy capacity, Security5, self-driving vehicle, Sentiment Analysis, similarity, SLA, Smooth path planning, software development lifecycle, software functionality, software porting, software requirements, software security, Software Specifications, sort real numbers, sorting, spatial ability, spatial visualization, spherical geometry, Spherical Tilings, square Euclidean distance, static analysis, survival analysis, TDARMA modeling, Telecom Data Mining, tiered architecture, time-frequency distribution, Time variance, Top-n Neighbor, transactional leadership, transformational leadership, triple negative breast cancer, Trust, trust evaluation, Trusted Cloud, TV coefficients, Underwater Acoustic Sensor Networks, Underwater embedded system, user interface2, user similarity, verification, vertical processing, Virtual Reality, Virtual Reality (VR), Vision 2030, web development.