Proceedings of 34th International Conference on Computers and Their Applications

Editors: Gordon Lee and Ying Jin
51 articles483 pagesPublished: March 13, 2019


Session M-A2: Computers in Education:
Pages 1-7
Pages 8-16
Pages 17-26
Pages 27-35
Session M-P1: Computational Issues:
Pages 36-44
Pages 45-54
Pages 55-64
Pages 65-74
Session M-P2: Algorithms I:
Pages 75-82
Pages 83-92
Pages 93-98
Pages 99-106
Session M-P3: Computer Security:
Pages 107-116
Pages 117-126
Pages 127-136
Pages 137-143
Pages 144-154
Session M-P4: Programming and Software Engineering:
Pages 155-167
Pages 168-179
Pages 180-190
Pages 191-202
Pages 203-209
Session T-A2: Computers in Healthcare:
Pages 210-218
Pages 219-224
Pages 225-235
Pages 236-246
Session T-P1: Visualization:
Pages 247-256
Pages 257-264
Pages 265-270
Pages 271-281
Session T-P2: Algorithms II:
Pages 282-291
Pages 292-300
Pages 301-309
Pages 310-316
Session T-P3: Special Session on Software Engineering Applications:
Pages 317-324
Pages 325-335
Pages 336-344
Pages 345-355
Session T-P4: Cloud Computing:
Pages 356-367
Pages 368-377
Pages 378-386
Pages 387-396
Pages 397-406
Session W-A1: Computers in Manufacturing and Business:
Pages 407-417
Pages 418-427
Pages 428-437
Pages 438-443
Session W-A2: Applications:
Pages 444-453
Pages 454-463
Pages 464-474
Pages 475-483


3-D printing, 3D printing, ABS, abstract interpretation, abstract syntax tree, Acceleration data, ACL Authentication, Additive Manufacturing2, Address Verification, Advanced Encryption Standard, AES, agent-based modeling, Agile Methods, Aircraft wing, Android, anomaly detection, Apache Kafka, Apache Spark, application development, Architecture, archive, artificial financial predictors, back-stepping control, behavior, Behaviour, behaviour-based detection, Biological Software, Botnet Detection, breast cancer, CANFIS, CDR, Chinese, CIS relationship with other computing disciplines, Cloud2, Cloud Computing3, Cloud Security2, Cloud Service Provider Selection, Clustering, code, Cognitive Radio Networks, collaborative, Command Line Interface, communication, compiler, Complexity., Composite, Computation Tree Logic, computational biology, Computer Information Systems curriculum, Computer Networks, Computer Science Education, conflict resolution, Contamination, cooperative communication, CTA mapping, Cyber Security, Cybersecurity, Data Communications, Data Encryption, Data Mining, Data Security, Data Warehouse, database, database audit, deadlock, deadlock detection, Delivery Model, demand, Design, Design Science, distance measure, distributed stream processing, Domain Generation Algorithm, driving, Drowsy, Dynamic Spectrum Access, e-commerce, EEG, Electronic Brake System (EBS), Electronic Maternity Records, emergency, ethnicity, eXtensible Access Control Markup Language, facial expressions, FDM, File Entropy, File Monitoring, filtering, financial time series, finite element analysis, FPGA., Framework security, Genius, GeoGebra., GIS, Global Position Data, glyph, GPGPU, Graph Database System, Healthcare social network, Hidden Markov Models, High-Level Synthesis, HLS, HTC Vive, HTTP/2.0, Human Computer Interaction, Human Computer Interaction (HCI), image processing, incident tracking, Inductive Logic Programming, Information Extraction, information representation, Information Security Risk Management, Injection molding, Integrated Development Environment, Integrity, intelligent parking, Intelligent Transportation Systems, Intrusion Detection, IoT, IS risk, IT leadership, JavaScript, K-means clustering, kanji, kinematics, leader-follower platoon, Leadership Style, locomotion, logogram, Lyapunov stability, Lyrics Database, machine learning3, magnet, malware detection, mHealth, Minkowski distance, mobile development, model checking, Multi Layer Perceptron, Multipath., music recommendation, musicology, MusiXmatch, Natural Language Processing, NetLogo, network, Network Security, neuro-fuzzy based identification, non-stationary signal, null pointer exception, octagon domain, Optimization, Oracle® database, parallel algorithms, parking lot occupancy, Personal Health Records, personalized recommendation, physical layer security, polyhedron model, prediction, Prediction of Event, prefecthing web requests, Prefetching, Privacy, Process-Resource Graph, prognosis, Progressive Web Apps, projectile motion, pTree., Ransomware, Rapid Tooling, Raspberry Pi, ray, real-time, Real-Time Constraints, Recommendation Systems, Regression, relay assignment, removal, Rendezvous Algorithm, reporting, Reputation, Resource Allocation Graph, reuse, risk management, road impact factor, road quality, route planning, RStudio, Saudi Arabia, secrecy capacity, Security5, self-driving vehicle, Sentiment Analysis, similarity, SLA, Smooth path planning, software development lifecycle, software functionality, software porting, software requirements, software security, Software Specifications, sort real numbers, sorting, spatial ability, spatial visualization, spherical geometry, Spherical Tilings, square Euclidean distance, static analysis, survival analysis, TDARMA modeling, Telecom Data Mining, tiered architecture, Time variance, time-frequency distribution, Top-n Neighbor, transactional leadership, transformational leadership, triple negative breast cancer, Trust, trust evaluation, Trusted Cloud, TV coefficients, Underwater Acoustic Sensor Networks, Underwater embedded system, user interface2, user similarity, verification, vertical processing, Virtual Reality, Virtual Reality (VR), Vision 2030, web development