


default search action
3rd AIKE 2020: Laguna Hills, CA, USA
- 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, AIKE 2020, Laguna Hills, CA, USA, December 9-13, 2020. IEEE 2020, ISBN 978-1-7281-8708-2

- Jorge Sampaio Silveira Junior

, João Paulo, Jérôme Mendes
, Daniela Alves
, Luís Mário Ribeiro
:
Automatic Calibration of Forest Fire Weather Index For Independent Customizable Regions Based on Historical Records. 1-8 - Ying Fung Yiu, Rabi N. Mahapatra:

Multi-Agent Pathfinding with Hierarchical Evolutionary Hueristic A. 9-16 - Hadi Ghahremannezhad, Hang Shi, Chengjun Liu:

A New Adaptive Bidirectional Region-of-Interest Detection Method for Intelligent Traffic Video Analysis. 17-24 - Wasif Bokhari, Ajay Bansal:

Asymmetric Error Control for Binary Classification in Medical Disease Diagnosis. 25-32 - Yuto Tsukagoshi, Shusaku Egami

, Yuichi Sei
, Yasuyuki Tahara, Akihiko Ohsuga:
Ontology-Based Correlation Detection Among Heterogeneous Data Sets: A Case Study of University Campus Issues. 33-40 - Clement Leung, Longjun Hao:

Analysis of Rewards in Bernoulli Bandits Using Martingales. 41-49 - A. A. Periola, Akintunde A. Alonge

, Kingsley A. Ogudo:
Architecture Model for Wireless Network Conscious Agent. 50-57 - Zhenyu Zhang, Chunhui Guo, Wenyu Peng, Shangping Ren:

Using Event Log Timing Information to Assist Process Scenario Discoveries. 58-64 - Alina Nesen, Bharat K. Bhargava:

Knowledge Graphs for Semantic-Aware Anomaly Detection in Video. 65-70 - Ying-Jia Lin

, Daniel Tan, Tzu-Hsuan Chou, Hung-Yu Kao, Hsin-Yang Wang:
Knowledge Distillation on Extractive Summarization. 71-76 - Mirjam Minor, Miriam Herold:

Discovery of Analogical Knowledge for the Transfer of Workflow Tasks. 77-83 - Anas Al-Tirawi

, Robert G. Reynolds:
Using Cultural Algorithms with Common Value Auctions to Provide Sustainability in Complex Dynamic Environments. 84-91 - Jihyeon Park, Munyeong Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh:

Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection. 92-99 - Tomoki Chiba, Yuichi Sei

, Yasuyuki Tahara, Akihiko Ohsuga:
A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data. 100-107 - Ying Fung Yiu, Rabi N. Mahapatra:

Heuristic Function Evolution For Pathfinding Algorithm in FPGA Accelerator. 108-115 - Javier Pastorino

, Ashis Kumer Biswas
:
Hey ML, what can you do for me? 116-119 - Aishwarya Asesh:

Computational Semantics: How to solve the suspense of supersense. 120-125 - Taskin Koçak

, Cagkan Ciloglu:
Real-time Restoration of Quality Distortions in Mobile Images using Deep Learning. 126-129 - Ching-Lung Su, Wen-Cheng Lai

, Yu-Kai Zhang, Ting-Jia Guo, Yi-Jiun Hung, Hui-Chiao Chen:
Artificial Intelligence Design on Embedded Board with Edge Computing for Vehicle Applications. 130-133 - Agostino Forestiero

:
Intrusion detection algorithm in Smart Environments featuring activity footprints approach. 134-137 - Maulik Gohil, Sathish A. P. Kumar:

Evaluation of Classification algorithms for Distributed Denial of Service Attack Detection. 138-141 - Negar Tajziyehchi, Mohammad Moshirpour, George Jergeas, Farnaz Sadeghpour:

A Predictive Model of Cost Growth in Construction Projects Using Feature Selection. 142-147 - Huber Nieto-Chaupis:

Convolution-based Machine Learning To Attenuate Covid-19's Infections in Large Cities. 148-152 - Satoru Watanabe, Hayato Yamana

:
Deep Neural Network Pruning Using Persistent Homology. 153-156 - Joshua Ho, Chien-Min Wang:

Explainable and Adaptable Augmentation in Knowledge Attention Network for Multi-Agent Deep Reinforcement Learning Systems. 157-161 - Malka N. Halgamuge

, Samurdika C. Hettikankanamge, Azeem Mohammad:
Trust Model to Minimize the Influence of Malicious Attacks in Sharding Based Blockchain Networks. 162-167 - Kengo Kuwana, Kenji Tei, Yoshiaki Fukazawa, Shinichi Honiden:

Method of Applying Df-pn Algorithm to On-the-fly Controller Synthesis. 168-173 - Rungsiman Nararatwong, Natthawut Kertkeidkachorn

, Ryutaro Ichise:
Knowledge Graph Visualization: Challenges, Framework, and Implementation. 174-178 - Debmalya Biswas:

Privacy Preserving Chatbot Conversations. 179-182 - Takuto Yamauchi, Kenji Tei, Shinichi Honiden:

Method for Low-Cost Environment Partitioning Modeling in Dynamic Update. 183-187 - Nina Kharlamova, Seyedmostafa Hashemi

, Chresten Træholt
:
The Cyber Security of Battery Energy Storage Systems and Adoption of Data-driven Methods. 188-192 - Huber Nieto-Chaupis:

Computational Simulation of Artificial Nanoparticles Paths. 193-197 - Nahed Abdelgaber, Chris Christos Nikolopoulos:

Overview on Quantum Computing and its Applications in Artificial Intelligence. 198-199 - Abhishek Gupta, Arun Sahayadhas

, Vivek Gupta:
Proposed Techniques to Design Speed Efficient Data Warehouse Architecture for Fastening Knowledge Discovery Process. 200-201 - Jumpei Ono, Miku Kawai, Takashi Ogata:

Toward Explanation-Centered Story Generation. 202-203

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














