default search action
SAI 2024: London, UK
- Kohei Arai:
Intelligent Computing - Proceedings of the 2024 Computing Conference, Volume 2, London, UK, 26-27 June 2024. Lecture Notes in Networks and Systems 1017, Springer 2024, ISBN 978-3-031-62276-2 - Jagriti Bhatia, Sanskriti Mathuria, Vandana M. Ladwani, Shobana Padmanabhan:
Optimised Round Robin with Virtual Runtime for CPU Scheduling. 1-17 - Jörg P. Schäfer:
Faster Lock-Free Atomic Shared Pointers. 18-38 - Christian Plewnia, Horst Lichter:
CICO2e: A Compute Carbon Footprint Estimation Tool Based on Time Series Data. 39-55 - Kohei Arai:
Image Classification Method Based on Chaos Neural Network. 56-73 - Steven Salter, Phoey Lee Teh, Richard Hebblewhite:
Human-Created and AI-Generated Text: What's Left to Uncover? 74-80 - Mona Alshehri, Natalia Beloff, Martin White:
AraXLM: New XLM-RoBERTa Based Method for Plagiarism Detection in Arabic Text. 81-96 - Angel Espinoza-Vega, Henry N. Roa:
Boosting Customer Retention in Pharmaceutical Retail: A Predictive Approach Based on Machine Learning Models. 97-117 - Guangzao Huang, Zijiang Yang, Grace Liu, Guoli Ji:
Introducing Prediction Concept into Data Envelopment Analysis Using Classifier in Economic Forecast. 118-127 - Cindy van den Berg, Sunet Eybers:
Investigating Machine Learning Techniques Used for the Detection of Class Noise in Data: A Systematic Literature Review. 128-147 - Preeti Patel, Sowgol Shooshtarian:
The Role of Chatbots in Data Analytics: An Evaluation of Functional Abilities. 148-168 - Zaid M. Altukhi, Nasser F. Aljohani:
An Analytical Investigation into the Impact of Product Color on the Price of Retail Products and Purchasing Decisions of Consumers. 169-186 - Nicolás Valenzuela:
A Numerical Approach for the Fractional Laplacian via Deep Neural Networks. 187-219 - Fang Hu, Jia Liu, Lina Wu, Xingang Fang, Mingfang Huang, Haotian Liu:
RBF-SC: A Fast Community Detection Technique Using Radial Basis Functions. 220-236 - Tom Ongwere, Nimbalkar Rutuja, Tam V. Nguyen:
Improving Medication Prescription Strategies for Discordant Chronic Comorbidities Through Medical Data Bench-Marking and Recommender Systems. 237-250 - Qiuyi Jin, Jin Zheng:
Sentiment Analysis for Predicting the Variation Trend of Stocks: A Case Study of Vanke Co., Ltd. 251-270 - Christianah T. Oyewale, Ayodeji O. J. Ibitoye, Joseph Damilola Akinyemi, Olufade F. W. Onifade:
Suicide Ideation Prediction Through Deep Learning: An Integration of CNN and Bidirectional LSTM with Word Embeddings. 271-283 - Avivit Levy, Michal Chalamish, B. Riva Shalom, Guy Sharir, Opal Peltzman, Sivan Salzmann:
A Multi-clustering Unbiased Relative Prediction Recommendation Scheme for Data with Hidden Multiple Overlaps. 284-302 - Atanu Dey, Mamata Jenamani, Arijit De:
An Unsupervised Deep Learning Model for Aspect Retrieving Using Transformer Encoder. 303-317 - Sean C. Mondesire, Emmanuel Nsiye:
Personalized Student Performance Prediction Modeling for Student Digital Twins. 318-329 - Xola Ntlangula, Wai Sze Leung:
A Social Profile-Based Recommendation Architecture for E-Learning Systems. 330-343 - Sher B. Chhetri, Mario Toussaint, Nonhle C. Mdziniso, Rebecca A. Hillman:
A Comparison of Student Engagement Across Three Teaching Modalities in an Introductory Statistics Course. 344-357 - V. Sithira Vadivel:
Impact Factor Game Scoring Model for Positive Emotion Game Design. 358-364 - Elmarie Kritzinger:
Cyber Safety Awareness Through a Massive Open Online Course (MOOC): Community Engagement Knowledge Transfer. 365-376 - Cristina Sánchez-Romero, Eva María Muñoz-Jiménez:
Immersive Environments at School: "Stop Cyberbullying by Proximity". 377-383 - Shampa Banik, Rajesh Manicavasagam, Trapa Banik, Shudipta Banik:
Simulation and Analysis of Cyber-Attack on Modbus Protocol for Smart Grids in Virtual Environment. 384-401 - Sebastiaan H. von Solms, Jaco du Toit:
Cybersecurity Governance in the Medical Ecosystem: An Orientation Guide with Specific Reference to the Merging of IT and OT Devices. 402-417 - Khalied Koorowlay, Rafid Al-Khannak:
The Impact of Utilising the Amazon AWS Hybrid Deployment Model on Assuring a Secure Migration of a Commercial Web Application into the Cloud. 418-431 - Mohd Maizan Fishol Hamdi, Zhiyuan Chen, Milena Radenkovic:
Mitigating Cache Pollution Attack Using Deep Learning in Named Data Networking (NDN). 432-442 - Nombeko Ntingi, Jaco du Toit, Sebastiaan H. von Solms:
A Community Security Operations Centre (ComSOC) Model for SMMEs in Developing Countries. 443-456 - Robert Stojic, Daniel Peters, Florian Thiel:
Optimizing Energy States in Mobile Embedded Systems: A SIPN-Based Approach. 457-477 - Saloni Jain, Ashwija Reddy Korenda, Bertrand Cambou, Chris Lucero:
Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic Keys. 478-498 - Sumio Morioka, Satoshi Obana, Maki Yoshida:
Feasibility Study with Actual Space Rockets Towards Information Theoretically Secure Radio Communication. 499-508 - Muhammed Ali Bingöl, Sermin Kocaman, Ali Dogan, Sibel Kurt Toplu:
FlexHi: A Flexible Hierarchical Threshold Signature Scheme. 509-529 - Silvio Russo, Claudio Zanasi, Isabella Marasco, Michele Colajanni:
Autoencoder-Based Solution for Intrusion Detection in Industrial Control System. 530-543 - Daniel P. Benalcazar, Pamela C. Zurita, Diego Pasmino, Rodrigo Lara:
Determining the Segmentation Type Impact on an ID Card Fraud Detection System. 544-555 - Nahin Nasir, Mohammed Shahriar Hossain, Md. Saiful Islam, Md. Arifiul Islam, Md Manirul Islam:
Transforming Medical Waste Management Through IoT and Machine Learning: A Path Towards Sustainability. 556-575 - Abhishrut Vaidya, Niladri Chatterjee:
IntentRec: An Advanced Recommender System Leveraging User-Item Intent. 576-595 - Martin Sommer, Daniel Baumann, Tobias Rösch, Falk Dettinger, Eric Sax, Michael Weyrich:
Process for the Identification of Vehicle Functions for Cloud Offloading. 596-608 - Rabail Tahir, John Krogstie:
Smart Workplace Past Covid-19: Perceived Challenges and Potential Smart Solutions for University Work Environment. 609-624 - Arshia Khan, Sakina Rao, Alfia Parvez:
Need for Cultural Sensitivity in the Design and Development of Technology to Aid in Dementia Care: A Review of Literature. 625-636 - Joseph Kwame Adjei, Hannah Alhassan Suhuyini:
Sentiment Analysis of Post-COVID-19 Work-From-Home Culture: A Literature Review. 637-652 - Catherine Njogu, Furaha Benedict, Susan Muthoni, Marie Noelle Kanyamuneza, Evalyne Lwoba, Everlyn Musembi, Yussuf Papy, Edwin Kairu:
Security Gaps in the Mobile Money System in Rwanda: Challenges, Risks and Mitigation. 653-664 - Ayda Bransia, Bálint Molnár, Simon Thompson:
Comparative Analysis of Flow and Cardano Blockchains: Navigating Adoption Challenges, Computing Techniques and Implications for the Blockchain Landscape. 665-670
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.