


default search action
6th ICICT 2023: Raleigh, NC, USA
- 6th International Conference on Information and Computer Technologies, ICICT 2023, Raleigh, NC, USA, March 24-26, 2023. IEEE 2023, ISBN 979-8-3503-0095-6
- Timothy Hamilton, Elif Sahin, Andrew Ayers, Alexander Cossifos, Gülüstan Dogan, Eric Moore:
Human Wellness in the Cape Fear River Basin Based on CAFO Data. 1-4 - Joshua Edwards, Gülüstan Dogan, Narcisa G. Pricope
:
Comparison of Machine and Deep Learning Models for the Prediction of Land Degradation. 5-12 - Bikhtiyar Hasan, Amine Boufaied:
Educational Group Formation Problem Resolution Based on an Improved Swarm Particle Optimization Using Fuzzy Knowledge. 13-21 - Zhao Mei, Mingjie Li:
Research on Supermarket Marketing Data Analysis Based on Business Intelligence. 22-28 - Minh Tran Binh, Long Nguyen, Dinh Nguyen Duc:
An Approach to Maintain the Balance between Exploitation and Exploration of the Evolutionary Process in Multi-objective Algorithms. 29-34 - Eron Neill, Gülüstan Dogan:
Rainfall Forecasting with Variational Autoencoders and LSTMs. 35-40 - Jonathan Daniel Sturdivant, Nicholas Morris, Tiara Hendricks, Gülüstan Dogan, Michel Heijnen:
Using Artificial Intelligence to Detect Falls. 41-44 - Tjada Nelson, Cory Nance, Cherie Noteboom:
Web Injection and Banking Trojan Malware -A Systematic Literature Review. 45-53 - Danny Salto-Sumba, Juan Vazquez-Verdugo, Juan Diego Jara
, Juan Pablo Bermeo:
Time-series method for predicting human traffic flow: A case study of Cañar, Ecuador. 54-59 - Sami Naqvi, Mohamed El-Sharkawy:
SE-RCN: An Economical Capsule Network. 60-65 - Jie Ying, Xin Jing, Chenyang Qin, Wei Huang:
Human Tissue Cell Image Segmentation optimization Algorithm Based on Improved U-net Network. 66-71 - Tong Yang, Yuguo Liu, Changxin Jin, Kai Jiang, Qiang Duan, Chen Song, Qibin Chen, Xue Li, Junzheng Ge, Rui Li:
Printed Circuit Board Defect Detection Based on Improved YOLOv5. 72-77 - Quchen Zou, Xinde Li, Chuanfei Hu:
AG-UN-Net: U-shaped and N-shaped network with attention gate for liver segmentation. 78-83 - Laura Mukhamadiyeva, Aiman Moldagulova:
A Combined Method for Face Recognition. 84-88 - Dorfell Parra, Carlos Camargo:
Design Methodology for Single-Channel CNN-Based FER Systems. 89-94 - Md. Imdadul Haque Emon, Khondoker Nazia Iqbal, Istinub Azad, Amena Akter Aporna, Nibraj Safwan Amlan, Md Saiful Islam, Rafeed Rahman:
Intracranial Brain Hemorrhage Diagnosis and Classification: A Hybrid Approach. 95-99 - Rajkumar Maharaju, Rama Valupadasu:
Lung Cancer Classification and Prediction of Disease Severity Score Using Deep Learning. 100-104 - Milos Cuculovic, Frédéric Fondement, Maxime Devanne, Jonathan Weber, Michel Hassenforder:
Named Entity Recognition for peer-review disambiguation in academic publishing. 105-114 - Mehari Yohannes Hailemariam
, Toshiyuki Amagasa:
Long Text Classification Using Pre-trained Language Model for a Low-Resource Language. 115-120 - Ty Edwards, Ridwan Rashid Noel:
Detecting Fake News Using Machine Learning Based Approaches. 121-126 - Mubashar Mustafa, Feng Zeng, Usama Manzoor, Lin Meng:
Discovering Coherent Topics from Urdu Text: A Comparative Study of Statistical Models, Clustering Techniques and Word Embedding. 127-131 - Daria Hemmerling
, Magdalena Wójcik-Pedziwiatr, Pawel Jaciów, Bartosz Ziólko, Magdalena Igras-Cybulska
:
Monitoring of Parkinson's Disease Progression based on Speech Signal. 132-137 - Phornsawan Roemsri, Supadchaya Puangpontip, Rattikorn Hewett:
On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective? 138-143 - Ryuya Uda, Taeko Kotani:
Consideration for Creation of Training Samples for Targeted Malware Detection by Machine Learning. 144-149 - Ardian Isufi, Marika Apostolova:
Risk Assessment of Cloud Infrastructure and Services for Software Development Startups. 150-155 - Djamel Khadraoui, Christophe Feltus:
Development of Build-MaaS Architecture, a Mobility-as-a-Service platform for the Construction Sector. 156-161 - Talha Younas, Muluneh Mekonnen, Ghulam Farid, Hafiz Mudassir Munir, Osama Younas:
A Solution to Channel Aging in 5G Massive MIMO. 162-166 - Abhishek Deokar, Mohamed El-Sharkawy:
Deployment of Proposed EfficientNeXt on NXP i.MX 8M Mini. 167-170 - Ifedotun Roseline Idowu, Ayisat Wuraola Asaju-Gbolagade, Kazeem Alagbe Gbolagade:
An Optimal Machine Learning Framework for the Enhancement of Intrusion Detection in Wireless Sensor Network Using Metaheuristic and RNS Technique. 171-176 - Emre Gures, Ibraheem Shayea
, Sawsan Ali Saad, Ayman A. El-Saleh:
Adaptive Handover Decision Algorithm for Load Balancing in 5G Heterogeneous Networks. 177-181 - Makoto Sato, Tomohiro Takagi:
Improved Consistency in Price Negotiation Dialogue System Using Parameterized Action Space with Generative Adversarial Imitation Learning. 188-197 - Zitong Zhang
, Ashraf Yaseen
:
A Content-Based Dataset Recommendation System for Biomedical Datasets. 198-202 - Marco B. Caminati, Juliana Küster Filipe Bowles
:
Representation Theorems Obtained by Mining across Web Sources for Hints. 203-210 - Lei Xu, Xue Song, Jipeng Hou, Liehuang Zhu:
Blockchain-based Certificate Management with Multi-Party Authentication. 211-219 - Eric Blancaflor, Harold Kobe S. Billo, Bianca Ysabel P. Saunar, John Michael P. Dignadice, Philip T. Domondon:
Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering tool. 220-225 - Ping Zheng, Danyang Qin, Jianan Bai, Lin Ma:
Image-Based Indoor Localization Using Smartphone Cameras In Textureless Environment. 226-231 - Mapula Elisa Maeko, Dustin van der Haar:
Ethical implications of using artificial intelligence for multimodal biometric selection model evaluation. 232-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.