CINXE.COM
Accepted Papers
<!DOCTYPE html><html lang="en-US" itemscope itemtype="http://schema.org/WebPage"><head><meta charset="utf-8"><script nonce="QSuORaoVyfXEDaRAuFB2mg">var DOCS_timing={}; DOCS_timing['sl']=new Date().getTime();</script><script nonce="QSuORaoVyfXEDaRAuFB2mg">function _DumpException(e) {throw e;}</script><script data-id="_gd" nonce="QSuORaoVyfXEDaRAuFB2mg">window.WIZ_global_data = {"K1cgmc":"%.@.[null,null,null,[null,1,[1732003420,759500000]]]]","nQyAE":{}};</script><script nonce="QSuORaoVyfXEDaRAuFB2mg">_docs_flag_initialData={"atari-emtpr":false,"atari-eibrm":false,"docs-text-elei":false,"docs-text-usc":true,"atari-bae":false,"docs-text-emtps":true,"docs-text-etsrdpn":false,"docs-text-etsrds":false,"docs-text-endes":false,"docs-text-escpv":true,"docs-text-ecfs":false,"docs-text-ecis":true,"docs-text-eectfs":true,"docs-text-edctzs":true,"docs-text-eetxpc":false,"docs-text-eetxp":false,"docs-text-ertkmcp":true,"docs-text-ettctvs":false,"docs-text-ettts":true,"docs-text-escoubs":false,"docs-text-escivs":false,"docs-text-escitrbs":false,"docs-text-ecgvd":false,"docs-text-esbbcts":true,"docs-text-etccdts":false,"docs-text-etcchrs":false,"docs-text-etctrs":false,"docs-text-eltbbs":true,"docs-text-ecvdis":false,"docs-text-elaiabbs":false,"docs-text-eiosmc":false,"docs-text-ecslpo":false,"docs-text-etb":false,"docs-text-esbefr":false,"docs-text-ipi":false,"docs-etshc":false,"docs-text-tbcb":2.0E7,"docs-efsmsdl":false,"docs-text-etof":false,"docs-text-ehlb":false,"docs-text-epa":true,"docs-text-dwit":false,"docs-text-elawp":false,"docs-eec":false,"docs-ecot":"","docs-text-enbcr":false,"docs-sup":"","umss":false,"docs-eldi":false,"docs-dli":false,"docs-liap":"/logImpressions","ilcm":{"eui":"AHKXmL2VXzB_mDxXawykl4KJhtwJbThlkQJbXM895JLcb0wZq4Y3OHaSm2KGFiYZRbKZ_JYlboyV","je":1,"sstu":1732334285613985,"si":"CKLX543I8YkDFRADbwYdQFEfZA","gsc":null,"ei":[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747267,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71652840,71652848,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94333163,94333171,94353368,94353376,94390153,94390161,94397741,94397749,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444292,94444300,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086191,95086199,95087186,95087194,95087227,95087235,95112873,95112881,95118561,95118569,95135923,95135931,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95266740,95266748,95270945,95270953,95271343,95271351,95314802,95314810,95317975,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101544667,101544675,101606928,101606936,101617516,101617524,101631040,101631048,101705087,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101922739,101922747],"crc":0,"cvi":[]},"docs-ccdil":false,"docs-eil":true,"info_params":{},"buildLabel":"editors.sites-viewer-frontend_20241112.02_p1","docs-show_debug_info":false,"atari-jefp":"/_/view/jserror","docs-jern":"view","atari-rhpp":"/_/view","docs-ecuach":false,"docs-cclt":2033,"docs-ecci":true,"docs-esi":false,"docs-efypr":true,"docs-eyprp":true}; _docs_flag_cek= null ; if (window['DOCS_timing']) {DOCS_timing['ifdld']=new Date().getTime();}</script><meta name="viewport" content="width=device-width, initial-scale=1"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="referrer" content="origin"><link rel="icon" href="https://lh6.googleusercontent.com/O4_aWuT9EmW4cOWbUgneT6D8WAY2U5h0IrUeXUWV0giiXFiB1d8q1cSj65By1x7WE7M3B9VaEhqBPndqjkrZYiE5vTyEZhEREaprwIzqdEL1VmCD"><meta property="og:title" content="Accepted Papers"><meta property="og:type" content="website"><meta property="og:url" content="https://sites.google.com/view/dsa--2020/accepted-papers"><meta property="og:description" content=" Accepted Papers Using Machine Learning Image Recognition for Code Reviews Michael Dorin1, 2, Trang Le3, Rajkumar Kolakaluri4, Sergio Montenegro5, 1Aerospace Information Technology, Universität Würzburg,Würzburg, Germany, 2Engineering, University of St. Thomas, St. Paul, MN. USA, 3Engineering,"><meta itemprop="name" content="Accepted Papers"><meta itemprop="description" content=" Accepted Papers Using Machine Learning Image Recognition for Code Reviews Michael Dorin1, 2, Trang Le3, Rajkumar Kolakaluri4, Sergio Montenegro5, 1Aerospace Information Technology, Universität Würzburg,Würzburg, Germany, 2Engineering, University of St. Thomas, St. Paul, MN. USA, 3Engineering,"><meta itemprop="url" content="https://sites.google.com/view/dsa--2020/accepted-papers"><meta itemprop="thumbnailUrl" content="https://lh5.googleusercontent.com/XvomDthpiQLSlPnh4gKVZtIoXe5OOlbBish1EXyFERbuGDsx3OFfvRc-hySM3ngciGEBx8INXwea9xKA3ji6pEY=w16383"><meta itemprop="image" content="https://lh5.googleusercontent.com/XvomDthpiQLSlPnh4gKVZtIoXe5OOlbBish1EXyFERbuGDsx3OFfvRc-hySM3ngciGEBx8INXwea9xKA3ji6pEY=w16383"><meta itemprop="imageUrl" content="https://lh5.googleusercontent.com/XvomDthpiQLSlPnh4gKVZtIoXe5OOlbBish1EXyFERbuGDsx3OFfvRc-hySM3ngciGEBx8INXwea9xKA3ji6pEY=w16383"><meta property="og:image" content="https://lh5.googleusercontent.com/XvomDthpiQLSlPnh4gKVZtIoXe5OOlbBish1EXyFERbuGDsx3OFfvRc-hySM3ngciGEBx8INXwea9xKA3ji6pEY=w16383"><link href="https://fonts.googleapis.com/css?family=Montserrat%3A400%2C700%7CBitter%3A400%2C700&display=swap" rel="stylesheet" nonce="FzTKLzlB9U1gApCwvegbJg"><link href="https://fonts.googleapis.com/css?family=Google+Sans:400,500|Roboto:300,400,500,700|Source+Code+Pro:400,700&display=swap" rel="stylesheet" nonce="FzTKLzlB9U1gApCwvegbJg"><style nonce="FzTKLzlB9U1gApCwvegbJg">@media only screen and (max-width: 479px){.jgG6ef{font-size: 17.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.jgG6ef{font-size: 17.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.jgG6ef{font-size: 18.0pt;}}@media only screen and (min-width: 1280px){.jgG6ef{font-size: 18.0pt;}}</style><link rel="stylesheet" href="https://www.gstatic.com/_/atari/_/ss/k=atari.vw.7R57rYYVGiA.L.X.O/am=MBiA/d=1/rs=AGEqA5nH97dOwqY0iGblvGlWiaR59owncA" data-id="_cl" nonce="FzTKLzlB9U1gApCwvegbJg"><script nonce="QSuORaoVyfXEDaRAuFB2mg"></script><title>Accepted Papers</title><style jsname="ptDGoc" nonce="FzTKLzlB9U1gApCwvegbJg">.ImnMyf{background-color: rgba(255,255,255,1); color: rgba(33,33,33,1);}.Vs12Bd{background-color: rgba(240,240,240,1); color: rgba(33,33,33,1);}.S5d9Rd{background-color: rgba(58,58,58,1); color: rgba(255,255,255,1);}.O13XJf{height: 340px;}.O13XJf .IFuOkc{background-image: url(https://ssl.gstatic.com/atari/images/vision-header.jpg);}.O13XJf .IFuOkc:before{background-color: rgba(31,31,31,1); opacity: 0.5; display: block;}.O13XJf .zfr3Q{color: rgba(255,255,255,1);}.O13XJf .qnVSj{color: rgba(255,255,255,1);}.O13XJf .Glwbz{color: rgba(255,255,255,1);}.O13XJf .qLrapd{color: rgba(255,255,255,1);}.O13XJf .aHM7ed{color: rgba(255,255,255,1);}.O13XJf .NHD4Gf{color: rgba(255,255,255,1);}.O13XJf .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(0,0,0,1); color: rgba(0,0,0,1); font-family: Bitter; font-size: 11pt; line-height: normal;}@media only screen and (max-width: 479px){.O13XJf .QmpIrf{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.O13XJf .QmpIrf{font-size: 11pt;}}@media only screen and (max-width: 479px){.O13XJf{height: 250px;}}.SBrW1{height: 430px; padding-bottom: 120px; padding-top: 120px;}@media only screen and (min-width: 1280px){.yMcSQd .SBrW1{padding-bottom: 120px; padding-top: 176px;}}@media only screen and (max-width: 1279px){.Ly6Unf .SBrW1{padding-bottom: 120px; padding-top: 176px;}}.Wew9ke{fill: rgba(255,255,255,1);}.fOU46b .KJll8d{background-color: rgba(255,255,255,1);}.fOU46b .tCHXDc{color: rgba(255,255,255,1);}.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.fOU46b .G8QRnc .tCHXDc{color: rgba(255,255,255,1);}.fOU46b .G8QRnc .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.fOU46b .aCIEDd .tCHXDc{color: rgba(255,255,255,1);}.fOU46b .aCIEDd .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.b2Iqye.fOU46b .G8QRnc .tCHXDc{color: rgba(33,33,33,1);}}.b2Iqye.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}@media only screen and (min-width: 1280px){.b2Iqye.fOU46b .aCIEDd .tCHXDc{color: rgba(0,0,0,1);}}.b2Iqye.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}@media only screen and (min-width: 1280px){.XeSM4.b2Iqye.fOU46b .LBrwzc .tCHXDc{color: rgba(255,255,255,1);}}.XeSM4.b2Iqye.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.KuNac.b2Iqye.fOU46b .GBy4H .tCHXDc{color: rgba(33,33,33,1);}}.KuNac.b2Iqye.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}@media only screen and (min-width: 1280px){.fOU46b .XeSM4 .tCHXDc{color: rgba(255,255,255,1);}}.fOU46b .XeSM4 .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.fOU46b .KuNac .tCHXDc{color: rgba(33,33,33,1);}}.fOU46b .KuNac .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}.fOU46b .YTv4We.chg4Jd:focus:before{border-color: rgba(255,255,255,1); display: block;}.fOU46b .zDUgLc{opacity: 1;}.fOU46b .LBrwzc .zDUgLc{border-bottom-style: none;}.YSH9J{color: rgba(255,255,255,1);}.oNsfjf{color: rgba(255,255,255,1);}.wgxiMe{background-color: rgba(67,125,152,1);}.JzO0Vc{background-color: rgba(67,125,152,1);}.M63kCb{background-color: rgba(255,255,255,1);}.zfr3Q{font-family: Bitter; color: rgba(33,33,33,1); font-size: 11pt; line-height: 1.6; margin-top: 15px;}.qnVSj{color: rgba(33,33,33,1);}.Glwbz{color: rgba(33,33,33,1);}.dhtgD{text-decoration: underline;}.dhtgD:hover{opacity: 0.7;}.dhtgD:active{opacity: 0.7;}.yaqOZd .duRjpb:not(.TYR86d):not(.Ap4VC):first-child{padding-top: 13px;}.yaqOZd .duRjpb:not(.TYR86d):first-of-type{padding-top: 13px;}.yaqOZd .duRjpb:not(.TYR86d):last-child{padding-bottom: 13px;}.duRjpb{font-family: Montserrat; font-size: 34pt; line-height: 1.2; font-weight: 700; color: rgba(67,125,152,1);}.duRjpb:not(.TYR86d){margin-top: 30px; padding-top: 13px; padding-bottom: 13px; border-bottom-color: rgba(240,240,240,1); border-top-color: rgba(240,240,240,1); border-bottom-style: solid; border-top-style: solid; border-bottom-width: 5px; border-top-width: 5px;}.Ap4VC{margin-bottom: -30px;}.qLrapd{color: rgba(67,125,152,1);}.JYVBee{font-family: Bitter; font-size: 21pt; line-height: 1.25; font-weight: 700; margin-top: 25px; color: rgba(33,33,33,1);}.CobnVe{margin-bottom: -25px;}.aHM7ed{color: rgba(33,33,33,1);}.OmQG5e{font-family: Bitter; font-size: 15pt; line-height: 1.25; margin-top: 20px; font-weight: 700; color: rgba(67,125,152,1);}.GV3q8e{margin-bottom: -20px;}.NHD4Gf{color: rgba(67,125,152,1);}.duRjpb .OUGEr{color: rgba(67,125,152,1);}.JYVBee .OUGEr{color: rgba(33,33,33,1);}.OmQG5e .OUGEr{color: rgba(67,125,152,1);}.TMjjoe{font-family: Montserrat; font-size: 9pt; line-height: 1.2; margin-top: 0px;}.Zjiec{font-family: Montserrat; font-weight: 400; font-size: 20pt; line-height: 1.75; margin-top: 48px; margin-left: 48px; margin-bottom: 62px; margin-right: 32px;}.XMyrgf{margin-top: 48px; margin-left: 48px; margin-bottom: 0px; margin-right: 32px;}.PsKE7e{font-family: Bitter; font-weight: 400; font-size: 12pt;}.IKA38e{border-left-width: 8px; border-left-style: solid; border-left-color: transparent;}.lhZOrc{color: 0.6; border-left-color: rgba(255,255,255,1); font-weight: 700;}.rysYnb .mohMlc{padding-left: 24px;}.Mz8gvb{color: rgba(255,255,255,1);}.LBrwzc .YSH9J{color: rgba(33,33,33,1);}.LBrwzc .oNsfjf{color: rgba(33,33,33,1);}.LBrwzc .KJll8d{background-color: rgba(33,33,33,1);}.LBrwzc .YTv4We.chg4Jd:focus:before{border-color: rgba(33,33,33,1); display: block;}.LBrwzc .Mz8gvb{color: rgba(33,33,33,1);}.LBrwzc .wgxiMe{background-color: rgba(255,255,255,1);}.LBrwzc .lhZOrc{border-left-color: rgba(67,125,152,1);}.LBrwzc .M9vuGd{border-bottom-color: rgba(67,125,152,1);}.LBrwzc .Mz8gvb{color: rgba(33,33,33,1);}.LBrwzc .zDUgLc{border-bottom-color: rgba(204,204,204,1); border-bottom-width: 1px; border-bottom-style: solid;}.GBy4H .oNsfjf{color: rgba(255,255,255,1);}.GBy4H .YSH9J{color: rgba(255,255,255,1);}.GBy4H .Mz8gvb{color: rgba(255,255,255,1);}.GBy4H .wgxiMe{background-color: rgba(0,0,0,1);}.GBy4H .M9vuGd{border-bottom-color: rgba(255,255,255,1);}.GBy4H .Mz8gvb{color: rgba(255,255,255,1);}.TlfmSc{font-family: Montserrat; font-weight: 400; font-size: 15pt; line-height: 1.33;}.jgXgSe{font-family: Bitter; font-weight: 400; font-size: 12pt; line-height: 28px;}.u5fiyc{line-height: 28px;}.IKA38e{padding-left: 28px; margin-top: 20px;}.hDrhEe{font-family: Bitter; font-weight: 400;}.iwQgFb{height: 2px; margin-top: 8px; background-color: rgba(0,0,0,0.150000006);}.ySLm4c{font-family: Bitter;}.CbiMKe{background-color: rgba(67,125,152,1);}.QmpIrf{background-color: rgba(67,125,152,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.qeLZfd:before{background-color: rgba(240,240,240,1); display: block;}.qeLZfd .iwQgFb{background-color: rgba(67,125,152,1);}.qeLZfd .zfr3Q{color: rgba(33,33,33,1);}.qeLZfd .qnVSj{color: rgba(33,33,33,1);}.qeLZfd .Glwbz{color: rgba(33,33,33,1);}.qeLZfd .duRjpb{border-bottom-color: rgba(255,255,255,1); border-top-color: rgba(255,255,255,1); color: rgba(67,125,152,1);}.qeLZfd .qLrapd{color: rgba(67,125,152,1);}.qeLZfd .JYVBee{color: rgba(33,33,33,1);}.qeLZfd .aHM7ed{color: rgba(33,33,33,1);}.qeLZfd .OmQG5e{color: rgba(67,125,152,1);}.qeLZfd .NHD4Gf{color: rgba(67,125,152,1);}.qeLZfd .duRjpb .OUGEr{color: rgba(67,125,152,1);}.qeLZfd .JYVBee .OUGEr{color: rgba(33,33,33,1);}.qeLZfd .OmQG5e .OUGEr{color: rgba(67,125,152,1);}.lQAHbd:before{background-color: rgba(58,58,58,1); display: block;}.lQAHbd .iwQgFb{background-color: rgba(67,125,152,1);}.lQAHbd .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(0,0,0,1); color: rgba(0,0,0,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.lQAHbd .CbiMKe{background-color: rgba(255,255,255,1);}@media only screen and (max-width: 479px){.lQAHbd .QmpIrf{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.lQAHbd .QmpIrf{font-size: 11pt;}}.lQAHbd .zfr3Q{color: rgba(255,255,255,1);}.lQAHbd .qnVSj{color: rgba(255,255,255,1);}.lQAHbd .Glwbz{color: rgba(255,255,255,1);}.lQAHbd .duRjpb{color: rgba(255,255,255,1); border-top-color: rgba(48,48,48,1); border-bottom-color: rgba(48,48,48,1);}.lQAHbd .qLrapd{color: rgba(255,255,255,1);}.lQAHbd .JYVBee{color: rgba(255,255,255,1);}.lQAHbd .aHM7ed{color: rgba(255,255,255,1);}.lQAHbd .OmQG5e{color: rgba(255,255,255,1);}.lQAHbd .NHD4Gf{color: rgba(255,255,255,1);}.lQAHbd .OUGEr{color: rgba(255,255,255,1);}.LB7kq{padding-bottom: 56px; padding-top: 56px;}@media only screen and (max-width: 479px){.LB7kq{padding-bottom: 28px; padding-top: 28px;}}@media only screen and (min-width: 1280px){.yMcSQd .LB7kq{padding-bottom: 56px; padding-top: 112px;}}@media only screen and (min-width: 1280px){.yMcSQd .tCHXDc{color: rgba(255,255,255,1);}}.yMcSQd .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.yMcSQd .LBrwzc .tCHXDc{color: rgba(33,33,33,1);}}.yMcSQd .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}@media only screen and (min-width: 1280px){.yMcSQd .GBy4H .tCHXDc{color: rgba(255,255,255,1);}}.yMcSQd .GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.KuNac.yMcSQd .GBy4H .tCHXDc{color: rgba(255,255,255,1);}}.KuNac.yMcSQd .GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 480px) and (max-width: 1279px){.Ly6Unf .LB7kq{padding-bottom: 56px; padding-top: 112px;}}@media only screen and (min-width: 480px) and (max-width: 1279px){.Ly6Unf .tCHXDc{color: rgba(255,255,255,1);}}.Ly6Unf .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 480px) and (max-width: 1279px){.Ly6Unf .GBy4H .tCHXDc{color: rgba(255,255,255,1);}}.Ly6Unf .GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 480px) and (max-width: 1279px){.Ly6Unf .LBrwzc .tCHXDc{color: rgba(33,33,33,1);}}.Ly6Unf .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}@media only screen and (max-width: 479px){.Ly6Unf .LB7kq{padding-bottom: 28px; padding-top: 84px;}}@media only screen and (max-width: 479px){.Ly6Unf .tCHXDc{color: rgba(255,255,255,1);}}.Ly6Unf .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (max-width: 479px){.Ly6Unf .GBy4H .tCHXDc{color: rgba(255,255,255,1);}}.Ly6Unf .GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (max-width: 479px){.Ly6Unf .LBrwzc .tCHXDc{color: rgba(33,33,33,1);}}.Ly6Unf .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}@media only screen and (min-width: 480px) and (max-width: 767px){.Ly6Unf .gk8rDe{padding-top: 84px; padding-bottom: 28px;}}@media only screen and (max-width: 479px){.Ly6Unf .gk8rDe{padding-top: 56px; padding-bottom: 0px;}}.LB7kq .duRjpb{font-size: 58pt; line-height: 1.06; font-weight: 700; margin-top: 35px; border-bottom-style: none; border-top-style: none;}@media only screen and (max-width: 479px){.LB7kq .duRjpb{font-size: 37pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.LB7kq .duRjpb{font-size: 49pt;}}.cJgDec .zfr3Q{color: rgba(255,255,255,1); border-bottom-color: rgba(255,255,255,1); border-top-color: rgba(255,255,255,1);}.cJgDec .zfr3Q .OUGEr{color: rgba(255,255,255,1);}.cJgDec .qnVSj{color: rgba(255,255,255,1);}.cJgDec .Glwbz{color: rgba(255,255,255,1);}.cJgDec .qLrapd{color: rgba(255,255,255,1);}.cJgDec .aHM7ed{color: rgba(255,255,255,1);}.cJgDec .NHD4Gf{color: rgba(255,255,255,1);}.cJgDec .IFuOkc:before{background-color: rgba(33,33,33,1); opacity: 0.5; display: block;}.cJgDec .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(0,0,0,1); color: rgba(0,0,0,1); font-family: Bitter; font-size: 11pt; line-height: normal;}@media only screen and (max-width: 479px){.cJgDec .QmpIrf{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.cJgDec .QmpIrf{font-size: 11pt;}}.tpmmCb .zfr3Q{color: rgba(15,15,15,1); border-bottom-color: rgba(15,15,15,1); border-top-color: rgba(15,15,15,1);}.tpmmCb .zfr3Q .OUGEr{color: rgba(15,15,15,1);}.tpmmCb .qnVSj{color: rgba(15,15,15,1);}.tpmmCb .Glwbz{color: rgba(15,15,15,1);}.tpmmCb .qLrapd{color: rgba(15,15,15,1);}.tpmmCb .aHM7ed{color: rgba(15,15,15,1);}.tpmmCb .NHD4Gf{color: rgba(15,15,15,1);}.tpmmCb .IFuOkc:before{background-color: rgba(255,255,255,1); display: block;}.tpmmCb .Wew9ke{fill: rgba(15,15,15,1);}.tpmmCb .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(0,0,0,1); color: rgba(0,0,0,1); font-family: Bitter; font-size: 11pt; line-height: normal;}@media only screen and (max-width: 479px){.tpmmCb .QmpIrf{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.tpmmCb .QmpIrf{font-size: 11pt;}}.gk8rDe .duRjpb{font-size: 40pt;}.gk8rDe .zfr3Q{color: rgba(15,15,15,1);}.gk8rDe .duRjpb{color: rgba(15,15,15,1);}.gk8rDe .qLrapd{color: rgba(15,15,15,1);}.gk8rDe .OmQG5e{color: rgba(15,15,15,1);}.gk8rDe .NHD4Gf{color: rgba(15,15,15,1);}.gk8rDe .QmpIrf{background-color: rgba(67,125,152,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Bitter; font-size: 11pt; line-height: normal;}@media only screen and (max-width: 479px){.gk8rDe .duRjpb{font-size: 27pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .duRjpb{font-size: 34pt;}}@media only screen and (max-width: 479px){.gk8rDe .QmpIrf{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .QmpIrf{font-size: 11pt;}}.zDUgLc{background-color: rgba(67,125,152,1); opacity: 1;}.qV4dIc{border-bottom-color: rgba(255,255,255,0); border-bottom-style: solid; border-bottom-width: 8px; padding-top: 14px; padding-bottom: 6px; padding-left: 2px; padding-right: 2px; margin-left: 10px; margin-right: 10px;}.M9vuGd{border-bottom-color: rgba(255,255,255,1);}.eWDljc{background-color: rgba(67,125,152,1); padding-bottom: 28px;}.PsKE7e:hover{opacity: 0.6;}.BFDQOb:hover{opacity: 0.6;}.QcmuFb{padding-left: 20px;}.vDPrib{padding-left: 40px;}.TBDXjd{padding-left: 60px;}.bYeK8e{padding-left: 80px;}.CuqSDe{padding-left: 100px;}.Havqpe{padding-left: 120px;}.JvDrRe{padding-left: 140px;}.o5lrIf{padding-left: 160px;}.yOJW7c{padding-left: 180px;}.rB8cye{padding-left: 200px;}.RuayVd{padding-right: 20px;}.YzcKX{padding-right: 40px;}.reTV0b{padding-right: 60px;}.vSYeUc{padding-right: 80px;}.PxtZIe{padding-right: 100px;}.ahQMed{padding-right: 120px;}.rzhcXb{padding-right: 140px;}.PBhj0b{padding-right: 160px;}.TlN46c{padding-right: 180px;}.GEdNnc{padding-right: 200px;}.xkUom{border-color: rgba(67,125,152,1); color: rgba(67,125,152,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.xkUom:hover{background-color: rgba(67,125,152,0.1000000015);}.KjwKmc{color: rgba(67,125,152,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.KjwKmc:hover{background-color: rgba(67,125,152,0.1000000015);}.lQAHbd .xkUom{border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.lQAHbd .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.lQAHbd .KjwKmc{color: rgba(255,255,255,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.lQAHbd .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}@media only screen and (max-width: 479px){.lQAHbd .xkUom{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.lQAHbd .xkUom{font-size: 11pt;}}@media only screen and (max-width: 479px){.lQAHbd .KjwKmc{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.lQAHbd .KjwKmc{font-size: 11pt;}}.lQAHbd .Mt0nFe{border-color: rgba(255,255,255,0.200000003);}.cJgDec .xkUom{border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.cJgDec .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.cJgDec .KjwKmc{color: rgba(255,255,255,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.cJgDec .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}@media only screen and (max-width: 479px){.cJgDec .xkUom{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.cJgDec .xkUom{font-size: 11pt;}}@media only screen and (max-width: 479px){.cJgDec .KjwKmc{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.cJgDec .KjwKmc{font-size: 11pt;}}.tpmmCb .xkUom{border-color: rgba(67,125,152,1); color: rgba(67,125,152,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.tpmmCb .xkUom:hover{background-color: rgba(67,125,152,0.1000000015);}.tpmmCb .KjwKmc{color: rgba(67,125,152,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.tpmmCb .KjwKmc:hover{background-color: rgba(67,125,152,0.1000000015);}@media only screen and (max-width: 479px){.tpmmCb .xkUom{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.tpmmCb .xkUom{font-size: 11pt;}}@media only screen and (max-width: 479px){.tpmmCb .KjwKmc{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.tpmmCb .KjwKmc{font-size: 11pt;}}.gk8rDe .xkUom{border-color: rgba(67,125,152,1); color: rgba(67,125,152,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.gk8rDe .xkUom:hover{background-color: rgba(67,125,152,0.1000000015);}.gk8rDe .KjwKmc{color: rgba(67,125,152,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.gk8rDe .KjwKmc:hover{background-color: rgba(67,125,152,0.1000000015);}@media only screen and (max-width: 479px){.gk8rDe .xkUom{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .xkUom{font-size: 11pt;}}@media only screen and (max-width: 479px){.gk8rDe .KjwKmc{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .KjwKmc{font-size: 11pt;}}.O13XJf .xkUom{border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.O13XJf .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.O13XJf .KjwKmc{color: rgba(255,255,255,1); font-family: Bitter; font-size: 11pt; line-height: normal;}.O13XJf .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}@media only screen and (max-width: 479px){.O13XJf .xkUom{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.O13XJf .xkUom{font-size: 11pt;}}@media only screen and (max-width: 479px){.O13XJf .KjwKmc{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.O13XJf .KjwKmc{font-size: 11pt;}}.Y4CpGd{font-family: Bitter; font-size: 11pt;}.CMArNe{background-color: rgba(240,240,240,1);}@media only screen and (max-width: 479px){.duRjpb{font-size: 24pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.duRjpb{font-size: 29pt;}}@media only screen and (max-width: 479px){.JYVBee{font-size: 17pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.JYVBee{font-size: 19pt;}}@media only screen and (max-width: 479px){.OmQG5e{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.OmQG5e{font-size: 14pt;}}@media only screen and (max-width: 479px){.TMjjoe{font-size: 9pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TMjjoe{font-size: 9pt;}}@media only screen and (max-width: 479px){.Zjiec{font-size: 16pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.Zjiec{font-size: 18pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12pt;}}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14pt;}}@media only screen and (max-width: 479px){.jgXgSe{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.jgXgSe{font-size: 12pt;}}@media only screen and (max-width: 479px){.QmpIrf{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.QmpIrf{font-size: 11pt;}}@media only screen and (max-width: 479px){.xkUom{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.xkUom{font-size: 11pt;}}@media only screen and (max-width: 479px){.KjwKmc{font-size: 11pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.KjwKmc{font-size: 11pt;}}section[id="h.6733c0423917f49d_11"] .IFuOkc:before{opacity: 0.6;}section[id="h.45186a77f411eb4a_251"] .IFuOkc:before{opacity: 0.3;}</style><script nonce="QSuORaoVyfXEDaRAuFB2mg">_at_config = [null,"AIzaSyChg3MFqzdi1P5J-YvEyakkSA1yU7HRcDI","897606708560-a63d8ia0t9dhtpdt4i3djab2m42see7o.apps.googleusercontent.com",null,null,null,null,null,null,null,null,null,null,null,"SITES_%s",null,null,null,null,null,null,null,null,null,["AHKXmL2VXzB_mDxXawykl4KJhtwJbThlkQJbXM895JLcb0wZq4Y3OHaSm2KGFiYZRbKZ_JYlboyV",1,"CKLX543I8YkDFRADbwYdQFEfZA",1732334285613985,[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747267,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71652840,71652848,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94333163,94333171,94353368,94353376,94390153,94390161,94397741,94397749,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444292,94444300,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086191,95086199,95087186,95087194,95087227,95087235,95112873,95112881,95118561,95118569,95135923,95135931,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95266740,95266748,95270945,95270953,95271343,95271351,95314802,95314810,95317975,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101544667,101544675,101606928,101606936,101617516,101617524,101631040,101631048,101705087,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101922739,101922747]],null,null,null,null,0,null,null,null,null,null,null,null,null,null,"https://drive.google.com",null,null,null,null,null,null,null,null,null,0,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"v2internal","https://docs.google.com",null,null,null,null,null,null,"https://sites.google.com/new/",null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,"",null,null,null,null,null,null,null,null,null,null,null,null,6,null,null,"https://accounts.google.com/o/oauth2/auth","https://accounts.google.com/o/oauth2/postmessageRelay",null,null,null,null,78,"https://sites.google.com/new/?usp\u003dviewer_footer",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://www.gstatic.com/atari/embeds/83a60601c213b72fb19c1855fb0c5f26/intermediate-frame-minified.html",0,null,"v2beta",null,null,null,null,null,null,4,"https://accounts.google.com/o/oauth2/iframe",null,null,null,null,null,null,"https://1999219729-atari-embeds.googleusercontent.com/embeds/16cb204cf3a9d4d223a0a3fd8b0eec5d/inner-frame-minified.html",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://sites.google.com/view/dsa--2020/accepted-papers",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,0,null,"",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,[1732334285615,"editors.sites-viewer-frontend_20241112.02_p1","695977640",null,1,1,""],null,null,null,null,0,null,null,0,null,null,null,null,null,null,null,null,20,500,"https://domains.google.com",null,0,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,1,0,1,0,0,0,0,null,null,null,null,null,"https://www.google.com/calendar/embed",null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,"PROD",0,null,0,null,1]; window.globals = {"enableAnalytics":true,"webPropertyId":"","showDebug":false,"hashedSiteId":"36aa513231029a1cfae622ce935ddbde02694e354dc6b8581b7340403c6cd84a","normalizedPath":"view/dsa--2020/accepted-papers","pageTitle":"Accepted Papers"}; function gapiLoaded() {if (globals.gapiLoaded == undefined) {globals.gapiLoaded = true;} else {globals.gapiLoaded();}}window.messages = []; window.addEventListener && window.addEventListener('message', function(e) {if (window.messages && e.data && e.data.magic == 'SHIC') {window.messages.push(e);}});</script><script src="https://apis.google.com/js/client.js?onload=gapiLoaded" nonce="QSuORaoVyfXEDaRAuFB2mg"></script><script nonce="QSuORaoVyfXEDaRAuFB2mg">(function(){}).call(this); </script><script nonce="QSuORaoVyfXEDaRAuFB2mg">const imageUrl = 'https:\/\/lh5.googleusercontent.com\/9cnkeXvFpqtCziRPKyof6cS6qdzk7H-jePYMiWjHD_JZpU10WKH4anSFshLEZ5n3HNFHtP7kGbUKUZZHThNT6A\x3dw16383'; function bgImgLoaded() { if (!globals.headerBgImgLoaded) { globals.headerBgImgLoaded = new Date().getTime(); } else { globals.headerBgImgLoaded(); } } if (imageUrl) { const img = new Image(); img.src = imageUrl; img.onload = bgImgLoaded; globals.headerBgImgExists = true; } else { globals.headerBgImgExists = false; } </script></head><body dir="ltr" itemscope itemtype="http://schema.org/WebPage" id="yDmH0d" css="yDmH0d"><div jscontroller="pc62j" jsmodel="iTeaXe" jsaction="rcuQ6b:WYd;GvneHb:og1FDd;vbaUQc:uAM5ec;"><div id="docs-banner-container"><div id="docs-banners"><div id="HB1eCd-mzNpsf-r8s4j-ORHb"></div><div id="HB1eCd-TZk80d-r8s4j-ORHb" aria-live="assertive" aria-atomic="true"></div></div><div class="HB1eCd-Vkfede-NBtyUd-PvRhvb-LwH6nd"></div></div><div jscontroller="X4BaPc" jsaction="rcuQ6b:WYd;o6xM5b:Pg9eo;HuL2Hd:mHeCvf;VMhF5:FFYy5e;sk3Qmb:HI1Mdd;JIbuQc:rSzFEd(z2EeY),aSaF6e(ilzYPe);"><div jscontroller="o1L5Wb" data-sitename="dsa--2020" data-search-scope="1" data-universe="1" jsmodel="fNFZH" jsaction="Pe9H6d:cZFEp;WMZaJ:VsGN3;hJluRd:UADL7b;zuqEgd:HI9w0;tr6QDd:Y8aXB;MxH79b:xDkBfb;JIbuQc:SPXMTb(uxAMZ),LjG1Ed(a6mxbb);" jsname="G0jgYd"><div jsname="gYwusb" class="p9b27"></div><div jscontroller="RrXLpc" jsname="XeeWQc" role="banner" jsaction="keydown:uiKYid(OH0EC);rcuQ6b:WYd;zuqEgd:ufqpf;JIbuQc:XfTnxb(lfEfFf),AlTiYc(GeGHKb),AlTiYc(m1xNUe),zZlNMe(pZn8Oc);YqO5N:ELcyfe;"><div jsname="bF1uUb" class="BuY5Fd" jsaction="click:xVuwSc;"></div><div jsname="MVsrn" class="TbNlJb "><div role="button" class="U26fgb mUbCce fKz7Od h3nfre M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="GeGHKb" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div><div class="E2UJ5" jsname="M6JdT"><div class="rFrNMe b7AJhc zKHdkd" jscontroller="pxq3x" jsaction="clickonly:KjsqPd; focus:Jt1EX; blur:fpfTEe; input:Lg5SV" jsshadow jsname="OH0EC" aria-expanded="true"><div class="aCsJod oJeWuf"><div class="aXBtI I0VJ4d Wic03c"><span jsslot class="A37UZe qgcB3c iHd5yb"><div role="button" class="U26fgb mUbCce fKz7Od i3PoXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="lfEfFf" aria-label="Search" aria-disabled="false" tabindex="0" data-tooltip="Search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div><div class="EmVfjc SKShhf" data-loadingmessage="Loading…" jscontroller="qAKInc" jsaction="animationend:kWijWc;dyRcpb:dyRcpb" jsname="aZ2wEe"><div class="Cg7hO" aria-live="assertive" jsname="vyyg5"></div><div jsname="Hxlbvc" class="xu46lf"><div class="ir3uv uWlRce co39ub"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv GFoASc Cn087"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv WpeOqd hfsr6b"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv rHV3jf EjXFBf"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div></div></div><div role="button" class="U26fgb mUbCce fKz7Od JyJRXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="m1xNUe" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div></span><div class="Xb9hP"><input type="search" class="whsOnd zHQkBf" jsname="YPqjbf" autocomplete="off" tabindex="0" aria-label="Search this site" value="" aria-disabled="false" autofocus role="combobox" data-initial-value=""/><div jsname="LwH6nd" class="ndJi5d snByac" aria-hidden="true">Search this site</div></div><span jsslot class="A37UZe sxyYjd MQL3Ob"><div role="button" class="U26fgb mUbCce fKz7Od Kk06A M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="pZn8Oc" aria-label="Clear search" aria-disabled="false" tabindex="0" data-tooltip="Clear search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="fAUEUd" viewBox="0 0 24 24" focusable="false"><path d="M19 6.41L17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12z"></path><path d="M0 0h24v24H0z" fill="none"></path></svg></span></span></div></span><div class="i9lrp mIZh1c"></div><div jsname="XmnwAc" class="OabDMe cXrdqd"></div></div></div><div class="LXRPh"><div jsname="ty6ygf" class="ovnfwe Is7Fhb"></div></div></div></div></div></div></div><div jsname="tiN4bf"><style nonce="FzTKLzlB9U1gApCwvegbJg">.rrJNTc{opacity: 0;}.bKy5e{pointer-events: none; position: absolute; top: 0;}</style><div class="bKy5e"><div class="rrJNTc" tabindex="-1"><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jsname="z2EeY" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to main content</span></button></div><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf br90J" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf br90J" jsname="ilzYPe" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to navigation</span></button></div></div></div><div class="M63kCb N63NQ"></div><div class="QZ3zWd"><div class="fktJzd AKpWA fOU46b G9Qloe XeSM4 XxIgdb" jsname="UzWXSb" data-uses-custom-theme="false" data-legacy-theme-name="Vision" data-legacy-theme-font-kit="Bold" data-legacy-theme-color-kit="Custom" jscontroller="Md9ENb" jsaction="gsiSmd:Ffcznf;yj5fUd:cpPetb;HNXL3:q0Vyke;e2SXKd:IPDu5e;BdXpgd:nhk7K;rcuQ6b:WYd;"><header id="atIdViewHeader"><div class="BbxBP HP6J1d K5Zlne" jsname="WA9qLc" jscontroller="RQOkef" jsaction="rcuQ6b:JdcaS;MxH79b:JdcaS;VbOlFf:ywL4Jf;FaOgy:ywL4Jf; keydown:Hq2uPe; wheel:Ut4Ahc;" data-top-navigation="true" data-is-preview="false"><div class="DXsoRd YTv4We oNsfjf" role="button" tabindex="0" jsaction="click:LUvzV" jsname="z4Tpl" id="s9iPrd" aria-haspopup="true" aria-controls="yuynLe" aria-expanded="false"><svg class="wFCWne" viewBox="0 0 24 24" stroke="currentColor" jsname="B1n9ub" focusable="false"><g transform="translate(12,12)"><path class="hlJH0" d="M-9 -5 L9 -5" fill="none" stroke-width="2"/><path class="HBu6N" d="M-9 0 L9 0" fill="none" stroke-width="2"/><path class="cLAGQe" d="M-9 5 L9 5" fill="none" stroke-width="2"/></g></svg></div><nav class="JzO0Vc" jsname="ihoMLd" role="navigation" tabindex="-1" id="yuynLe" jsaction="transitionend:UD2r5"><a class="XMyrgf" href="/view/dsa--2020/home"><img src="https://lh5.googleusercontent.com/XvomDthpiQLSlPnh4gKVZtIoXe5OOlbBish1EXyFERbuGDsx3OFfvRc-hySM3ngciGEBx8INXwea9xKA3ji6pEY=w16383" class="r9CsCb" role="img" aria-label="Site home"></a><ul class="jYxBte Fpy8Db" tabindex="-1"><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/home" data-url="/view/dsa--2020/home" data-type="1" data-level="1">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/paper-submission" data-url="/view/dsa--2020/paper-submission" data-type="1" data-level="1">Paper Submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/program-committee" data-url="/view/dsa--2020/program-committee" data-type="1" data-level="1">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/dsa--2020/accepted-papers" data-url="/view/dsa--2020/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/contact-us" data-url="/view/dsa--2020/contact-us" data-type="1" data-level="1">Contact Us</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/venue" data-url="/view/dsa--2020/venue" data-type="1" data-level="1">Venue</a></div></div></li></ul></nav><div class="VLoccc K5Zlne QDWEj U8eYrb" jsname="rtFGi"><div class="Pvc6xe"><div jsname="I8J07e" class="TlfmSc YSH9J"><a class="GAuSPc" jsname="jIujaf" href="/view/dsa--2020/home"><img src="https://lh5.googleusercontent.com/XvomDthpiQLSlPnh4gKVZtIoXe5OOlbBish1EXyFERbuGDsx3OFfvRc-hySM3ngciGEBx8INXwea9xKA3ji6pEY=w16383" class="lzy1Td" role="img" aria-label="Site home" jsname="SwcDWb"></a> </div><nav class="plFg0c" jscontroller="HXO1uc" jsaction="rcuQ6b:rcuQ6b;MxH79b:CfS0pe;" id="WDxLfe" data-is-preview="false" style="visibility: hidden;" role="navigation" tabindex="-1"><ul jsname="waIgnc" class="K1Ci7d oXBWEc jYxBte"><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/home" data-url="/view/dsa--2020/home" data-type="1" data-level="1">Home</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/paper-submission" data-url="/view/dsa--2020/paper-submission" data-type="1" data-level="1">Paper Submission</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/program-committee" data-url="/view/dsa--2020/program-committee" data-type="1" data-level="1">Program Committee</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J M9vuGd" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/dsa--2020/accepted-papers" data-url="/view/dsa--2020/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/contact-us" data-url="/view/dsa--2020/contact-us" data-type="1" data-level="1">Contact Us</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/venue" data-url="/view/dsa--2020/venue" data-type="1" data-level="1">Venue</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf ZmrVpf oXBWEc" more-menu-item jsaction="mouseenter:Vx8Jlb; mouseleave:ysDRUd"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-expanded="false" aria-haspopup="true" data-level="1">More</a><div class="mBHtvb u5fiyc" role="presentation" title="Expand/Collapse" jsaction="click:oESVTe" jsname="ix0Hvc"><svg class="dvmRw" viewBox="0 0 24 24" stroke="currentColor" jsname="HIH2V" focusable="false"><g transform="translate(9.7,12) rotate(45)"><path class="K4B8Y" d="M-4.2 0 L4.2 0" stroke-width="2"/></g><g transform="translate(14.3,12) rotate(-45)"><path class="MrYMx" d="M-4.2 0 L4.2 0" stroke-width="2"/></g></svg></div></div></div><div class="oGuwee eWDljc RPRy1e Mkt3Tc" style="display:none;" jsname="QXE97" jsaction="transitionend:SJBdh" role="group"><ul class="VcS63b"><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/home" data-url="/view/dsa--2020/home" data-type="1" data-in-more-submenu="true" data-level="2">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/paper-submission" data-url="/view/dsa--2020/paper-submission" data-type="1" data-in-more-submenu="true" data-level="2">Paper Submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/program-committee" data-url="/view/dsa--2020/program-committee" data-type="1" data-in-more-submenu="true" data-level="2">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/dsa--2020/accepted-papers" data-url="/view/dsa--2020/accepted-papers" data-type="1" data-in-more-submenu="true" data-level="2">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/contact-us" data-url="/view/dsa--2020/contact-us" data-type="1" data-in-more-submenu="true" data-level="2">Contact Us</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/dsa--2020/venue" data-url="/view/dsa--2020/venue" data-type="1" data-in-more-submenu="true" data-level="2">Venue</a></div></div></li></ul></div></li></ul></nav><div jscontroller="gK4msf" class="RBEWZc" jsname="h04Zod" jsaction="rcuQ6b:WYd;JIbuQc:AT95Ub;VbOlFf:HgE5D;FaOgy:HgE5D;MxH79b:JdcaS;" data-side-navigation="false"><div role="button" class="U26fgb mUbCce fKz7Od iWs3gf Wdnjke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="R9oOZd" aria-label="Open search bar" aria-disabled="false" tabindex="0" data-tooltip="Open search bar" aria-expanded="false" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe tCHXDc YSH9J" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div></div></div><div jsname="mADGA" class="zDUgLc"></div></div><div class="TxnWlb" jsname="BDdyze" jsaction="click:LUvzV"></div></div></header><div role="main" tabindex="-1" class="UtePc RCETm" dir="ltr"><section id="h.6733c0423917f49d_11" class="yaqOZd LB7kq cJgDec nyKByd O13XJf KEFykf" style=""><div class="Nu95r"><div class="IFuOkc" style="background-size: cover; background-position: center center; background-image: url(https://lh5.googleusercontent.com/9cnkeXvFpqtCziRPKyof6cS6qdzk7H-jePYMiWjHD_JZpU10WKH4anSFshLEZ5n3HNFHtP7kGbUKUZZHThNT6A=w16383);" jsname="LQX2Vd"></div></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-ibL1re Ft7HRd-AhqUyc-ibL1re JNdkSc SQVYQc L6cTce-purZT L6cTce-pSzOP"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"></div></div></div><div class="hJDwNd-AhqUyc-OiUrBf Ft7HRd-AhqUyc-OiUrBf purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.6733c0423917f49d_14" class="hJDwNd-AhqUyc-OiUrBf Ft7HRd-AhqUyc-OiUrBf jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe lkHyyc"><h2 id="h.qinp06c9t2et" dir="ltr" class="CDt4Ke zfr3Q JYVBee" style="text-align: center;"><span class=" jgG6ef" style="font-family: Times New Roman; font-weight: normal; vertical-align: baseline;">International Conference on Data Science and Applications (DSA 2020)</span></h2><h2 id="h.ciom6sf22bg7" dir="ltr" class="CDt4Ke zfr3Q JYVBee" style="text-align: center;"><span class=" jgG6ef" style="font-family: Times New Roman; font-weight: normal; vertical-align: baseline;">November 28 ~ 29, 2020, London, United Kingdom</span></h2></div></div></div></div></div></div></div><div class="hJDwNd-AhqUyc-ibL1re Ft7HRd-AhqUyc-ibL1re JNdkSc SQVYQc L6cTce-purZT L6cTce-pSzOP"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"></div></div></div></div></div><div class="DnLU4" jsaction="JIbuQc:v5IJLd(ipHvib);"><div role="button" class="U26fgb mUbCce fKz7Od HqAAld Wew9ke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="ipHvib" aria-label="Scroll down" aria-disabled="false" tabindex="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="XE8yyf" viewBox="0 0 24 24" focusable="false"><path d="M7.41 7.84L12 12.42l4.59-4.58L18 9.25l-6 6-6-6z"/><path d="M0-.75h24v24H0z" fill="none"/></svg></span></span></div></div></section><section id="h.45186a77f411eb4a_271" class="yaqOZd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.45186a77f411eb4a_268" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><div id="h.gzitqkdy8b5y" class="GV3q8e aP9Z7e"></div><h3 id="h.gzitqkdy8b5y_l" dir="ltr" class="CDt4Ke zfr3Q OmQG5e" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.5; margin-bottom: 4pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: center; text-indent: 0;" tabindex="-1"><div jscontroller="Ae65rd" jsaction="touchstart:UrsOsc; click:KjsqPd; focusout:QZoaZ; mouseover:y0pDld; mouseout:dq0hvd;fv1Rjc:jbFSOd;CrfLRd:SzACGe;" class="CjVfdc"><div class="PPhIP rviiZ" jsname="haAclf"><div role="presentation" class="U26fgb mUbCce fKz7Od LRAOtb Znu9nd M9Bg4d" jscontroller="mxS5xe" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;" jsshadow aria-describedby="h.gzitqkdy8b5y_l" aria-label="Copy heading link" aria-disabled="false" data-tooltip="Copy heading link" aria-hidden="true" data-tooltip-position="top" data-tooltip-vertical-offset="12" data-tooltip-horizontal-offset="0"><a class="FKF6mc TpQm9d" href="#h.gzitqkdy8b5y" aria-label="Copy heading link" jsname="hiK3ld" role="button" aria-describedby="h.gzitqkdy8b5y_l"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -11px"><svg class="OUGEr QdAdhf" width="22px" height="22px" viewBox="0 0 24 24" fill="currentColor" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z"/></svg></span></span></a></div></div><span class=" jgG6ef" style="color: #000000; font-family: Times New Roman; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Accepted Papers</strong></span></div></h3><p dir="ltr" class="CDt4Ke zfr3Q"><br></p><p id="h.590dsiv84ngq" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Using Machine Learning Image Recognition for Code Reviews</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Michael Dorin</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1, 2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Trang Le</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">3</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Rajkumar Kolakaluri</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">4</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Sergio Montenegro</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">5</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Aerospace Information Technology, Universität Würzburg,Würzburg, Germany, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Engineering, University of St. Thomas, St. Paul, MN. USA, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">3</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Engineering, University of St. Thomas, St. Paul, MN. USA, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">4</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Engineering, University of St. Thomas, St. Paul, MN. USA, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">5</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Aerospace Information Technology, Universität Würzburg, Würzburg, Germany</span></p><p id="h.h8c66pqt1o33" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">It is commonly understood that code reviews are a cost-effective way of finding faults early in the development cycle. However, many modern software developers are too busy to do them. Skipping code reviews means aloss of opportunity to detect expensive faults prior tosoftware release. Software engineers can be pushed in many directions and reviewing code is very often considered anundesirable task, especially when time is wasted reviewing programs that are not ready. In this study, we wish to ascertain the potential for using machine learning and image recognition to detect immature software source code prior to a review. We show that it is possible to use machine learning to detect software problems visually and allow code reviews to focus on application details.The results are promising and are an indication that further research could be valuable.</span></p><p id="h.nfmcjgltymww" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Code Reviews, Machine Learning, Imagine Recognition, Coding Style.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.symqkstpc2y6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>MCA-IICD: Mobile and Cooperative Agent based Approach for Intelligent Integration of Complex Data</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Karima GOUASMIA and Wafa MEFTEH, University of Gabès, Tunisia</span></p><p id="h.qo9y5r2g9pwx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Since many years, data integration has become a delicate task in the data-warehousing process. Indeed, the collected data (from various applications and existing in different forms) must be homogenized to meet several needs such as analytical activities. Today, organizations collect a huge mass of data which become more and more complex. Collected data have different types (text, video, image...) and are located in heterogeneous and dispersed sources. The complexity and the dispersion of this data return their integration a difficult task that necessitates the use of efficient techniques and performed tools in order to provide a unified data source. Our objective is to take advantage of the agent software technology, in particular cooperative agents and mobile agents to perform the integration phase of complex data. This paper gives an overview about related works and presents a new approach (MCA-IICD) for an intelligent integration of complex data based on cooperative and mobile agents.</span></p><p id="h.91x309hi29g6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Cooperative agent, Mobile agent, Intelligent data integration.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.gmzuldclycdm" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>A Hybrid Harmony Search and Simulated Annealing Algorithm for Job Shop Scheduling Problem</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">FengLian Yuan, Huihui Wang, Bo Huang, Yubing Guo, and Hang Zhu, School of Computer Science & Engineering, Nanjing University of Science and Technology, Nanjing 210094 China</span></p><p id="h.bamwetatnuwv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">This paper proposes a new scheduling approach that combines harmony search (HS) and simulated annealing (SA) to efficiently solve the job shop scheduling problem (JSSP). This method uses the SA algorithm to generate initial solutions and new solutions for the HS algorithm. Since SA can explore an extensive solution space for optimal schedules by accepting worse solutions, it makes HS run with diverse solutions and more likely to reach a better solution for JSSP. This method can improve global search abilities and convergence in JSSP. Some experiments are carried out on a set of well-known benchmark instances to show the efficiency and effectiveness of the proposed method.</span></p><p id="h.baw2p34e8i9n" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Harmony Search, Hybrid Strategy, Job Shop Scheduling Problem & Simulated Annealing.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.mcxu6evamjhf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Explainable AI for Interpretable Credit Scoring</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Lara Marie Demajo, Vince Vella and Alexiei Dingli, Department of Artificial Intelligence, University of Malta, Msida, Malta</span></p><p id="h.kmdjctjugnlz" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">With the ever-growing achievements in Artificial Intelligence (AI) and the recent boosted enthusiasm in FinTech, applications such as credit scoring have gained substantial academic interest. Credit scoring helps financial experts make better decisions regarding whether or not to accept a loan application, such that loans with a high probability of default are not accepted. Apart from the noisy and highly imbalanced data challenges faced by such credit scoring models, recent regulations such as the `right to explanation' introduced by the General Data Protection Regulation (GDPR) and the Equal Credit Opportunity Act (ECOA) have added the need for model interpretability to ensure that algorithmic decisions are understandable and coherent. An interesting concept that has been recently introduced is eXplainable AI (XAI), which focuses on making black-box models more interpretable. In this work, we present a credit scoring model that is both accurate and interpretable. For classification, state-of-the-art performance on the HELOC and Lending Club Datasets is achieved using the XGBoost model. The model is then further enhanced with a 360-degree explanation framework, which provides different explanations (i.e. global, local feature-based and local instance-based) that are required by different people in different situations. Evaluation through the use of functionally-grounded, application-grounded and human-grounded analysis show that the explanations provided are simple, consistent as well as satisfy the six predetermined hypotheses testing for correctness, effectiveness, easy understanding, detail sufficiency and trustworthiness.</span></p><p id="h.n6fzh13cqm32" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Credit Scoring, Explainable AI, BRCG, XGBoost, GIRP, SHAP, Anchors, ProtoDash, HELOC, Lending Club.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.egwh8e8mmxwx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>An Intelligent and Data-driven Mobile Platform for Youth Volunteer Management using Machine Learning and Predictive Analytics</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Alyssa Huang</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;"> and Yu Sun</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Irvine, CA 92602, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, 91768</span></p><p id="h.j25bnan0rc7n" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Volunteering is very important to high school students because it not only allows the teens to apply the knowledge and skills they have acquired to real-life scenarios, but it also enables them to make an association between helping others and their own joy of fulfillment. Choosing the right volunteering opportunities to work on can influence how the teens interact with that cause and how well they can serve the community through their volunteering services. However, high school students who look for volunteer opportunities often do not have enough information about the opportunities around them, so they tend to take whatever opportunity that comes across. On the other hand, as organizations who look for volunteers usually lack effective ways to evaluate and select the volunteers that best fit the jobs, they will just take volunteers on a first-come, first-serve basis. Therefore, there is a need to build a platform that serves as a bridge to connect the volunteers and the organizations that offer volunteer opportunities. In this paper, we focus on creating an intelligent platform that can effectively evaluate volunteer performance and predict best-fit volunteer opportunities by using machine learning algorithms to study 1) the correlation between volunteer profiles (e.g. demographics, preferred jobs, talents, previous volunteering events, etc.) and predictive volunteer performance in specific events and 2) the correlation between volunteer profiles and future volunteer opportunities. Two highest-scoring machine learning algorithms are proposed to make predictions on volunteer performance and event recommendations. We demonstrate that the two highest-scoring algorithms are able to make the best prediction for each query. Alongside the practice with the algorithms, a mobile application, which can run on both iPhone and Android platforms is also created to provide a very convenient and effective way for the volunteers and event supervisors to plan and manage their volunteer activities. As a result of this research, volunteers and organizations that look for volunteers can both benefit from this data-driven platform for a more positive overall experience.</span></p><p id="h.md0vvo9z77i9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Machine learning, Predictive Analytics, Flutter, Volunteer Management, Scikit-learn.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.1251qgb436oj" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>A New Framework of Feature Engineering for Machine Learning in Financial Fraud Detection</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Chie Ikeda</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Karim Ouazzane</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Qicheng Yu</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">3</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">School of Computing and Digital Media, London Metropolitan University, London, UK, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">School of Computing and Digital Media, London Metropolitan University, London, UK, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">3</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">School of Computing and Digital Media, London Metropolitan University, London, UK</span></p><p id="h.e6lnmgx1wvp" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Financial fraud activities have soared despite the advancement of fraud detection models empowered by machine learning (ML). To address this issue, we propose a new framework of feature engineering for ML models. The framework consists of feature creation that combines feature aggregation and feature transformation, and feature selection that accommodates a variety of ML algorithms. To illustrate the effectiveness of the framework, we conduct an experiment using an actual financial transaction dataset and show that the framework significantly improves the performance of ML fraud detection models. Specifically, all the ML models complemented by a feature set generated from our framework surpass the same models without such a feature set by nearly 40% on the F1-measure and 20% on the AUC value.</span></p><p id="h.s833giud2vm9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Financial Fraud Detection, Feature Engineering, Feature Creation, Feature Selection, Machine Learning.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.csywmcqw5yo0" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>3-D Offline Signature Verification with Convolutional Neural Network</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Na Tyrer</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Fan Yang</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Gary C. Barber</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Guangzhi Qu</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Bo Pang</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;"> and Bingxu Wang</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1,2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Automotive Tribology Center, Department of Mechanical Engineering, School of Engineering and Computer Science, Oakland University, Rochester, Michigan, 48309, USA, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Faculty of Mechanical Engineering and Automation, Zhejiang Sci-Tech University, Hangzhou, Zhejiang, 310018, P.R.China</span></p><p id="h.4dde23fmnrxj" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Signature verification is essential to prevent the forgery of documents in financial, commercial, and legal settings. Utilizing the 3-D information presented by a signature using a 3D optical profilometer is a relatively new idea, and the convolutional neural network is a powerful tool for image recognition. The present research focused on using the 3 dimensions of offline signatures in combination with convolutional neural network to verify signatures. It was found that the accuracy of the data for offline signature verification has been over 90%, which would be a novel method in signature verification.</span></p><p id="h.odsrvtwb2tvh" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Signature Verification, 3D Optical Profilometer, Convolutional Neural Network.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.e7wpfs2ykd8w" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>A Network for Detecting Facial Features During the Covid-19 Epidemic</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Bin Lin and YanLin Mu and ZiLi Fu and Chaochao Li and Xuliang Duan, College of Information Engineering, Sichuan Agricultural University, Ya’an, China</span></p><p id="h.4hso8qrqb8n2" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">The new coronavirus can spread through respiratory droplets, and wearing a mask correctly can effectively prevent the virus from spreading. However, the current detection algorithms are based on unobstructed faces, which affects the detection task when wearing a mask. To solve these problems, a facial feature detection algorithm based on Mtcnn+Mobilenet+GDBT in complex scenes is proposed. First, it can detect whether to wear a mask and the fatigue state of the face. Second, it can set different thresholds according to the facial characteristics of different people, and initialize the characteristics of different frames in 5 seconds.Then train a dataset of masks and feature points containing 708 images. The experimental results show that compared with the traditional detection network, the new network can effectively detect facial features in the context of the epidemic. The detection loss of net is 0.01.</span></p><p id="h.rigzbcth7plk" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">MTCNN, Mobilenet, GDBT, Fatigue detecting, Facial feature points.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.w33rj03jx57o" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Negative Sampling in Knowledge Representation Learning: A Mini-review</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Jing Qian</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1, 2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Katie Atkinson</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Yong Yue</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;"> and Gangmin Li</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1*</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">School of Advanced Technology, Xi’an Jiaotong-Liverpool University, Suzhou, Jiangsu Province, China, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Department of Computer Science, University of Liverpool, Liverpool, United Kingdom</span></p><p id="h.iulok09mw9aw" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Knowledge representation learning (KRL) aims at encoding components of the knowledge graph (KG) into low-dimensional continuous space, which has made considerable successes. Due to space efficiency, most famous KGs contain only positive instances. Nevertheless, typical KRL techniques, especially translational distance-based models, are trained through discriminating positive and negative samples. Negative sampling is unquestionably a non-trivial step in KG embedding. The quality of generated negative samples can directly influence the performance of final knowledge representations in downstream tasks, such as link prediction and triple classification. This review summarizes current negative sampling methods in KRL and we roughly categorize them into three sorts, fixed distribution-based, generative adversarial net (GAN)-based and cluster sampling. Another two novel approaches are also mentioned.</span></p><p id="h.b5gqg8u9x6ce" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Knowledge Representation Learning, Negative Sampling, Generative Adversarial Nets.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.cr7bqwr1edox" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Image Wafer Inspection based on Template Matching</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Massimiliano Barone, STMicroelectronics, Agrate Brianza, Milano, Italy</span></p><p id="h.ryw0qh1xx21h" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">This paper presents a template matching technique for detecting defects in VLSI wafer images. This method is based on traditional techniques of image analysis and image registration, but it combines the prior art of image wafer inspection in a new way, using prior knowledge like the design layout of VLSI wafer manufacturing process. A golden template of the patterned wafer image under inspection can be obtained from the wafer image itself mixed to the prior knowledge mentioned above. First a mapping between physical space and pixel space is needed. Then a template matching is applied for a more accurate alignment between wafer device and template. Finally, a segmented comparison is used for finding out possible defects. Results of the proposed method are presented in terms of visual quality of defect detection, any misalignment at topology level and number of correctly detected defective devices.</span></p><p id="h.2tvi9l27y0m4" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Wafer inspection, template matching, image registration, pattern recognition, VLSI wafer images, golden template, segmented comparison, space mapping.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.ajyt9d597soc" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>An Efficient Language-independent Multi-font OCR for Arabic Script</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Hussein Osman, Karim Zaghw, Mostafa Hazem and Seifeldin Elsehely, Computer Engineering Department, Faculty of Engineering, Cairo University, Egypt</span></p><p id="h.d6ggdameaqx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Optical Character Recognition (OCR) is the process of extracting digitized text from images of scanned documents. While OCR systems have already matured in many languages, they still have shortcomings in cursive languages with overlapping letters such as the Arabic language. This paper proposes a complete Arabic OCR system that takes a scanned image of Arabic Naskh script as an input and generates a corresponding digital document. Our Arabic OCR system consists of the following modules: Pre-processing, Word-level Feature Extraction, Character Segmentation, Character Recognition, and Post-processing. This paper also proposes an improved font-independent character segmentation algorithm that outperforms the state-of-the-art segmentation algorithms. Lastly, the paper proposes a neural network model for the character recognition task. The system has experimented on several open Arabic corpora datasets with an average character segmentation accuracy 98.06%, character recognition accuracy 99.89%, and overall system accuracy 97.94% achieving outstanding results compared to the state-of-the-art Arabic OCR systems.</span></p><p id="h.kn2aefn11xnm" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Arabic OCR, Word Segmentation, Character Segmentation, Character Recognition, Neural Network.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.y60ny79dtl6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Minimum Probability Conversion Circuits for Stochastic Computing</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Chris Collinsworth, Sabiheh Salehi and Sayed Ahmad Salehi, Department of Electrical and Computer Engineering, University of Kentucky, USA</span></p><p id="h.17aimryjpmxn" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Stochastic number generators (SNGs) are used to convert binary numbers to bit-streams in stochastic circuits. While the hardware complexity for arithmetic operations in stochastic computing is significantly less than binary computing, the hardware overhead for SNGs is substantial. An SNG consists of two components: a random number source (RNS) and a probability conversion circuit (PCC). In this paper, we propose two PCC designs with minimum logic, in terms of 2-input gates, that reduce the hardware overhead of SNGs. The proposed PCCs generate bit-streams with very low correlation when they are used for two SNGs that share one RNS. Compared to prior work, the proposed designs can reduce hardware overhead for a 12-bit SNG by as much as 67%.</span></p><p id="h.ge0ygenw2bwc" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Stochastic computing, stochastic number generator, linear feedback shift register sharing, area-efficiency, cost reduction.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.6c465a7x9deg" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Incremental Automatic Correction for Digital Vlsi Circuits</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Lamya Gaber</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Aziza I. Hussein</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;"> and Mohammed Moness</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Department of Computers and Systems Engineering, Minia University, Minia, Egypt, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Department of Electrical and Computer Engineering, Effat University, Jeddah, KSA</span></p><p id="h.b3tfvxujbqqe" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Recently, the grown complexity of digital VLSI circuits has a high impact on verification methodologies. Many advances toword verification and debugging techniques of digital VLSI circuits has been arisen using Computer Aided Design (CAD). On the other hand, there is a lack of researches on automatically correcting faulty digital circuits. Also, the existing techniques are highly depended on a specific test patterns with specific number which is increased by rising the complexity of VLSI circuits. The second problem is a large size of injecting circuit for correction and large number of SAT solver calls that have also a negative impact on the consuming running time. Therefore, our goal is to avoid the dependency of a given test patterns by incrementally generating compact test patterns corresponding to design errors during rectification. Also, the second goal is to reduce the size of in-circuit mutation circuit for errorfixing process. In addition, the third improvement is the distribution of test patterns can be performed in parallel way that have a positive impact on digital VLSI circuit with large number of inputs and outputs. The experimental results illustrate that the proposed incremental correction algorithm can fix design bugs of type gate replacements in several digital VLSI circuits from ISCAS'85 with high speed and full accuracy. The speed of proposed Auto-correction mechanism outperforms the latest existing methods around 4.8x using ISCAS'85 benchmarks. The parallel distribution of test patterns on digital VLSI circuits during generating new compact test patterns achieves speed around 1.2x compared to latest methods.</span></p><p id="h.z6kryw4tiyef" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Auto-correction, ATPG, Fault detection, Verification.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.57b6kzerfxe0" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>FPGA Routing Acceleration by Extracting Unsatisfiable Subformulas</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Tiejun Li, Kefan Ma National University of Defense Technology, china</span></p><p id="h.vpgmdewbmym9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Explaining the causes of infeasibility of Boolean formulas has practical applications in various fields. A small unsatisfiable subset can provide a succinct explanation of infeasibility and is valuable for applications, such as FPGA routing. The Boolean-based FPGA detailed routing formulation expresses the routing constraints as a Boolean function which is satisfiable if and only if the layout is routable. The unsatisfiable subformulas can help the FPGA routing tool to diagnose and eliminate the causes of unroutable. For this typical application, a resolution-based local search algorithm to extract unsatisfiable subformulas is integrated into Boolean-based FPGA routing method. The fastest algorithm of deriving minimum unsatisfiable subformulas, called the branch-and-bound algorithm, is adopted to compare with the local search algorithm. On the standard FPGA routing benchmark, the results show that the local search algorithm outperforms the branch-and-bound algorithm on runtime. It is also concluded that the unsatisfiable subformulas play a very important role in FPGA routing real applications.</span></p><p id="h.my7bk0ars3vs" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">FPGA routing, Boolean satisfiability, unsatisfiable subformula, local search.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.fjqhrlyaqpnn" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Designof A Low Power Phase Locked Loop for Ultra Wide Band(UWB)Applications using 180Nm CMOS Technology</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Akash P,Harini S, Sumanth P, Rashmi S, Department of Electronics and Communication,Don Bosco Institute of Technology,Bengaluru, Karnataka, India</span></p><p id="h.jtdalcxpxogx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">The Phase-Locked Loop (PLL) is a primalsystem for the procreation of RF and microwave signals. It generates a versatile output frequency with a similar constancy of a crystal oscillator, by the effectuation of a feedback. This paper showcases the design of a Type-II phase locked loop(PLL) with reduced error rate and reduced phase noise, which has five essential blocks: 1)Phase-Frequencydetector(PFD), 2) Charge-Pump (CP), 3) Loop-Filter (LF), 4)Voltage-Controlled-Oscillator(VCO), and5)Frequency-Divider (FD), used for Wi-Max implementations in 3GHz of Ultra-Wide-Band(UWB) range. This being classified as a mixed-signal circuit, the PLL involves design challenges at high frequencies. Recent advances in integrated circuit technologies hasgiven rise to the employment of high performance PLL, which has become more efficient anddependable.The detailed design,description and simulation is done using the Cadence Tool (License 6.1). The general purpose directory kit (GPDK) used is 180nm technology.This paper showcasesa PLL operating at 3 GHz, where phase noise of overall PLL is -125dBc/Hz and power consumption is 3.17 mW for 1.8V supply. This is designed and presented in 180nm technology, aiming to provide advantageous power, cost and performance at its best.</span></p><p id="h.yz29go30t2nq" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Capture Range, Dead Zone, Loop Bandwidth, Phase Locked Loop(PLL), Phase Noise.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.ur453xefm4nm" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Controlled Machine Text Generation of Football Articles</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Tomasz Garbus, University of Warsaw, Poland</span></p><p id="h.x1fuluv903pv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Among other bene?ts of the rapid development in deep learning, language modelling (LM) systems have excelled at producing relatively long text samples that are (almost) indistinguishable from human-written text. This work categorizes conditional text generation systems into three paradigms: generation with placeholders, prompted generation, adversarial/reinforcement learning and provides an overview of each paradigm along with experiments – either machine- or human-judged. Example corpora of football news are used to discuss how a fast, domain-speci?c named entity recognition (NER) system can be built without much manual labour for English and Polish. The NER module is evaluated on manually labelled texts in both languages. It is then used not only to build ?ne- tuning sets for the language model, but also to aid its generation procedure, resulting in samples more compliant with provided control codes. Finally, a simple tool EDGAR for prompt-driven generation is presented. Two demos are made for the reader to experiment with and compare the proposed solutions with simply ?netuned GPT-2 model.</span></p><p id="h.tdocvp7qtbxs" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">text generation, Transformer, machine learning, named entity recognition, reinforcement learning, natural language generation.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.mw51uwz1mcwo" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Parallel Data Extraction Using Word Embeddings</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Pintu Lohar and Andy Way, ADAPT Centre, Dublin City University, Ireland</span></p><p id="h.jiq5a4sdfn5w" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Building a robust MT system requires a suficiently large parallel corpus to be available as training data. In this paper, we propose to automatically extract parallel sentences from comparable corpora without using any MT system or even any parallel corpus at all. Instead, we use crosslingual information retrieval (CLIR), average word embeddings, text similarity and a bilingual dictionary, thus saving a significant amount of time and effort as no MT system is involved in this process. We conduct experiments on two different kinds of data: (i) formal texts from news domain, and (ii) user-generated content (UGC) from hotel reviews. The automatically extracted sentence pairs are then added to the already available parallel training data and the extended translation models are built from the concatenated data sets. Finally, we compare the performance of our new extended models against the baseline models built from the available data. The experimental evaluation reveals that our proposed approach is capable of improving the translation outputs for both the formal texts and UGC.</span></p><p id="h.fz104a4axxcp" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Machine Translation, Parallel Data, User-generated Content, Word Embeddings.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.t3jvx0yi7w2" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Evaluating Dutch Named Entity Recognition and De-identification Methods in the Human Resource Domain</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Chaïm van Toledo, Friso van Dijk and Marco Spruit, Utrecht University, Utrecht, the Netherlands</span></p><p id="h.li3cf8id1go4" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">The human resource (HR) domain contains various types of privacy-sensitive textual data, such as e-mail correspondence and performance appraisal. Doing research on these documents brings several challenges, one of them anonymisation. In this paper, we evaluate the current Dutch text de-identification methods for the HR domain. We also update one of these methods with the latest named entity recognition (NER) models. The result is that the NER model based on the CoNLL 2002 corpus in combination with the BERTje transformer give the best combination for suppressing persons (recall 0.94) and locations (recall 0.82). For suppressing gender, DEDUCE is performing best (recall 0.53). We evaluate NER based on both strict de-identification of entities (a person must be suppressed as a person) as well as with a loose sense of de-identification (no matter what how a person is suppressed, as long it is suppressed).</span></p><p id="h.p88abm1ktqiv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Named Entity Recognition, Dutch, NER, BERT, evaluation, de-identification.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.8pqdt5xwn3wf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Text Generation with Long Short-term Memory Networks and Generative Probabilistic Networks</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Akwarandu Ugo Nwachuku</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;"> and Xavier-Lewis Palmer</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Northeastern University, Vancouver BC V6B 5A7, Canada, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Old Dominion University, Norfolk, VA 23529, USA</span></p><p id="h.1q88bz5eomqk" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Text-generation is an interesting area of study with Long short-term memory networks (LSTM). In this work, we present a process engineered to improve them. The method presented here does not deal directly with the workings of the LSTM network but instead mitigates the quality of accepted text generated by the LSTM. The research study aims to answer the question of how an LSTM can work to generate contextually significant texts based on prior inputs.Extracted semantic information in this paper is classified as sentiment, subjectivity, and verbs extracted from all sentences in the training data. A solution is proffered with a generative probabilistic model that predicts semantic information expected in upcoming text or sentences, based on a given sentence input. The semi-artificial intelligent process explored in this paper is applicable to any domain involving sequential data. The research study presents a semantically inclined text-generation method.</span></p><p id="h.3qay1l5wnqol" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Machine Learning, Artificial Intelligence, LSTM, Long short-term memory, Natural Language Processing.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.3zwjb9jwu8xl" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>An Optimized Cleaning Robot Path Generation and Execution System using Cellular Representation of Workspace</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Qile He</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;"> and Yu Sun</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Webber Academy, Calgary, Alberta, Canada, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, USA</span></p><p id="h.2n7p1r7ynfxp" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Many robot applications depend on solving the Complete Coverage Path Problem, or CCPP. Specifically, robot vacuum cleaners have seen increased use in recent years, and some models offer room mapping capability using sensors such as LiDAR. With the addition of room mapping, applied robotic cleaning has begun to transition from random walk and heuristic path planning into an environment-aware approach. In this paper, a novel solution for pathfinding and navigation of indoor robot cleaners is proposed. The proposed solution plans a path from a priori cellular decomposition of the work environment. The planned path achieves complete coverage on the map and reduces duplicate coverage. The solution is implemented inside the ROS framework, and is validated with Gazebo simulation. Metrics to evaluate the performance of the proposed algorithm seek to evaluate the efficiency by speed, duplicate coverage and distance travelled.</span></p><p id="h.xe8r3nsa139n" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Complete Coverage Path Planning, Mobile Robots, Graph Theory.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.yd3p5xpocz0u" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Digiprescription: An Intelligent System to Enable Paperless Prescription using Mobile Computing and Natural-language Processing</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Richard Zhang</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Yucheng Jiang</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Sophadeth Rithya</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Yu Sun</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Walnut Ave Irvine, CA 92604, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, 91768</span></p><p id="h.4pgj2e70nh47" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Through our app, it is aimed to teach and tell the patients how to use the drug properly taking off the chances of putting their lives in danger, especially the elderly. It is also efficient to give patients these instructions as well as saving lots of paper. Because of the law, every drug that is given from the pharmacy to the user includes a receipt that lists information of, patient’s information, drug information, insurance information, directions on taking the medicine (black box warning issued by FDA), medication details on how it works, side effects, storage rules, and etc. These pieces of information are crucial to patients, where it tells them how to use the drug properly, but most people would throw these receipts away, which is a risk as well as a waste. Through using this app, the patient can efficiently get information on how to properly use the drug. This application is also helpful, where the user can choose to set reminders on when to eat this drug each week or month.</span></p><p id="h.5qfikz9yt4eq" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Reminder System, HTML, Python, Firebase, Bootstrap.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.r3ajpgeu6mu9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Intrusion Detection In Computer Systems By Using Artificial Neural Networks With Deep Learning Approaches</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Sergio Hidalgo-Espinoza, Kevin Chamorro-Cupuerán and Oscar Chang- Tortolero, School of Mathematics and Computer Science, University of Yachay Tech, Ecuador</span></p><p id="h.dgm0wx1z1hhm" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Intrusion detection into computer networks has become one of the most important issues in cybersecurity. Attackers keep on researching and coding to discover new vulnerabilities to penetrate information security system. In consequence computer systems must be daily upgraded using up-to-date techniques to keep hackers at bay. This paper focuses on the design and implementation of an intrusion detection system based on Deep Learning architectures. As a first step, a shallow network is trained with labelled log-in [into a computer network] data taken from the Dataset CICIDS2017. The internal behaviour of this network is carefully tracked and tuned by using plotting and exploring codes until it reaches a functional peak in intrusion prediction accuracy. As a second step, an autoencoder, trained with big unlabelled data, is used as a middle processor which feeds compressed information and abstract representation to the original shallow network. It is proven that the resultant deep architecture has a better performance than any version of the shallow network alone. The resultant functional code scripts, written in MATLAB, represent a retrainable system which has been proved using real data, producing good precision and fast response.</span></p><p id="h.vwfi8yhs6cg" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Artificial Neural Networks, Information Security, Deep Learning, intrusion detection & hacking attacks.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.bnkyf71p5z01" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Towards a Risk Assessment for Big Data in Cloud Computing Environment</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Saadia Drissi and Soukaina Elhasnaoui, (EAS-LRI) Systems Architecture Team, ENSEM, Hassan II University, Morocco</span></p><p id="h.amgni5wkwiuw" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Cloud computing gives a relevant and adaptable support for Big Data by the ease of use, access to resources, low cost use of resources, and the use of strong equipment to process big data. Cloud and big data center on developing the value of a business while reducing capital costs. Big data and cloud computing, both favor companies and by cause of their benefit, the use of big data growths extremely in the cloud. With this serious increase, there are several emerging risk security concerns. Big data has more vulnerabilities with the comparison to classical database, as this database are stored in servers owned by the cloud provider. The various usage of data make safety-related big data in the cloud intolerable with the traditional security measures. The security of big data in the cloud needs to be looked at and discussed. In this current paper, the authors will present and discuss the risk assessment of big-data applications in cloud computing environments and present some ideas for assessing these risks.</span></p><p id="h.593vxmopsp0u" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Cloud computing, risk assessment, big data, security.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.uhi7qd4ji7x9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>RAPDAC: Role Centric Attribute based Policy Driven Access Control Model</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Jamil Ahmed, AvantureBytes, Canada</span></p><p id="h.oeqojhin3l5o" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Access control models aim to decide whether a user should be denied or granted access to the user’s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of ‘policy’ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the ‘access control policy’ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system.</span></p><p id="h.lqzazg8ugiyb" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Authorization, Access control model, RBAC.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.7gvr0f7t2x2d" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Testing Security Requirements</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Wolfgang Prentner and Harry Sneed, ZTP – Civil Technical Quality Assurance Company, Vienna, Austria</span></p><p id="h.pzcg9rvicr07" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Requirement-based testing is an approach to test software systems against their documented requirements against documented requirements. A system is considered to be tested when it fulfills all of its requirements. That implies that the test cases are taken from the requirement document. Security requirements are a special type of software requirements intended to protect the software against unauthorized usage and to safeguard their data against unauthorized access. They are usually derived from laws and regulations governing the use of IT systems and to the protection of data from misuse. As such, they are formulated in juristic terms of a natural language. To convert these terms into executable and validatable test cases is the task of the security tester. This contribution to technology uses a case study to describe how this can be done. The starting point is a natural language requirement document depicting what has to be prevented – the security measures to be implemented – in German das Lastenheft – and how it is to be prevented – in German das Pflichtenheft. From these two complementary documents logical test cases, i.e. test conditions are generated which are then joined with the appropriate test data to be converted into physical test cases which can be fed to an automated test driver. The final result is a set of security test cases and a security test plan.</span></p><p id="h.z61yrwfjpinq" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Software Security, Data Protection, Authorization, Authentication, Monitoring, Access Control, Security Test Cases, Security Test Planning, Security Test Design, Security Test Execution, Security Test Evaluation.</span></p><p id="h.2rxy0ghqgsea" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>A Context-aware and Geo-based Mobile Application to Automate the Notification of Public Health Issues using Big Data Analysis</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Angela Xiang</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;"> and Yu Sun</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Irvine, CA ,USA, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">California State Polytechnic University, CA, USA</span></p><p id="h.1mkkg9gfr07s" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Coronavirus disease 2019 (COVID-19) is causing an ongoing pandemic. Social distancing and quarantine are the few effective methods to reduce the spreading risk of the coronavirus among people. As business starts to open up and quarantine policies become looser, the risk of COVID-19 spreading becomes greater [1]. This paper describes the development of a computer application to track the user’s surroundings and calculate the exposure risk at a specific geographic location. Our application uses other user’s data and online databases with information on COVID-19 cases to calculate a percentage revealing the user’s possible risk at that location.</span></p><p id="h.v4hx84z2wqsx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Flutter, python Flask, Firebase, iOS, Android.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.36ht5vwk48nw" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>An Interactive Application to Assist Biology Learning using Augmented-reality</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Wenxi Li, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Marisabel Chang, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Yu Sun, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Irvine, CA 92620, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Department of Computer Science, California State Polytechnic University, Pomona</span></p><p id="h.88em267xw1ti" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">As students learn biology in term of molecule, cells, or proteins, cross section of 2D image is a traditional method study the details of them. However, this method cannot bridge the gap between reality and students’ imagination based on 2D image. This paper proposes a tool which can assist students to learn biology knowledge more effectively through augmented-reality. The experiments on accuracy and performance of the image pattern recognition indicates that FAST algorithm is the best choice currently. It reaches the highest accuracy of 94.5%.</span></p><p id="h.hai1efedxwxo" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Augment reality, Vuforia, Blender, Unity.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.h8pkzyke46za" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>U-mentalismutility Patent: an Overview</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Luís Homem, Centre for the Philosophy of Sciences of the University of Lisbon, University of Lisbon, Portugal</span></p><p id="h.px8mgt35qbby" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">This paper discloses in synthesis a super-computation computer architecture (CA) model, presently a provisional Patent Application at INPI (nº 116408). The outline is focused on a method to perform computation at or near the speed of light, resorting to an inversion of the Princeton CA. It expands from isomorphic binary/RGB (typical) digital “images”, in a network of (UTM)s over Turing-machines (M)s. From the binary/RGB code, an arithmetic theory of (typical) digital images permits fully synchronous/orthogonal calculus in parallelism, wherefrom an exponential surplus is achieved. One such architecture depends on any “cell”-like exponential-prone basis such as the “pixel”, or rather the RGB “octet-byte”, limited as it may be, once it is congruent with any wave-particle duality principle in observable objects under the electromagnetic spectrum and reprogrammable designed. Well-ordered instructions in binary/RGB modules are, further, programming composed to alter the structure of the Internet, in virtual/virtuous eternal recursion/recurrence, under man-machine/machine-machine communication ontology.</span></p><p id="h.i4872f3m6wz3" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">U-Mentalism, Super-computation, Computer Architecture, Cybernetics, Programming Languages Design.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.bvp9gkppoob9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Malady Detection On Plant Leaves Using Unsupervised Learning Algorithm</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Pushya Chaparala</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, Siva Shankar Rao. S</span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">1</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Department Of Computer Science And Engineering, Vignan’s Foundation Of Science And Research (Deemed To Be University), Vadlamudi, 522213, India, </span><sup style="color: #000000; font-family: Times New Roman; font-size: 7.199999999999999pt; font-style: normal; font-weight: normal; text-decoration: normal;">2</sup><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Department Of Computer Science And Engineering, Guru Nanak University, Ibrahimpatnam, 501506</span></p><p id="h.frmtmc50upzc" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Plant Pathology Role Is Important In Agriculture. We Proposed A Solution By Referring Many Existing Approaches That Use The Machine Learning To Detect The “Late Blight” Pathogen On The Leaves. For This, We Created A Database To Train Our System. A Plant Leaf Image Will Be Taken As An Input For This Proposal, This Image Will Be Filtered, Enhanced, And Segmented To Produce A Binary Image. To Acquire A Good Classification Results We Used K-means, Whereas For Texture Analysis Co-occurrence Distribution Method Is Used.</span></p><p id="h.kkbciwx5sbsp" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Pathology, K-mean Cluster Algorithm, Image Segmentation, Binary Image, Ccm.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 0; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: left; text-indent: 0;"><br></p><p id="h.7nnn39fab781" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Minimising Delay and Energy in Online Dynamic Fog Systems</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Faten Alenizi and Omer Rana, School of Computer Science and Informatics, Cardiff University, Cardiff, UK</span></p><p id="h.fbmn6mu6g4z4" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">The increasing use of Internet of Things (IoT) devices generates a greater demand for data transfers and puts increased pressure on networks. Additionally, connectivity to cloud services can be costly and inefficient. Fog computing provides resources in proximity to user devices to overcome these drawbacks. However, optimisation of quality of service (QoS) in IoT applications and the management of fog resources are becoming challenging problems. This paper describes a dynamic online offloading scheme in vehicular traffic applications that require execution of delay-sensitive tasks. This paper proposes a combination of two algorithms: dynamic task scheduling (DTS) and dynamic energy control (DEC) that aim to minimise overall delay, enhance throughput of user tasks and minimise energy consumption at the fog layer while maximising the use of resource-constrained fog nodes. Compared to other schemes, our experimental results show that these algorithms can reduce the delay by up to 80.79% and reduce energy consumption by up to 66.39% in fog nodes. Additionally, this approach enhances task execution throughput by 40.88%.</span></p><p id="h.2vn03uqxxjo6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; text-indent: 0; white-space: normal;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Dynamic Fog Computing, iFogSim, Computational Offloading, Energy Consumption, Delay.</span></p></div></div></div></div></div></div></div></div></div></section><section id="h.45186a77f411eb4a_291" class="yaqOZd qeLZfd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.45186a77f411eb4a_288" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p id="h.x60b4v6f1s9b" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.1; margin-bottom: 2pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-indent: 0;"><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: normal; vertical-align: baseline;">Contact Us</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.15; margin-bottom: 12pt; margin-left: 0; margin-right: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-indent: 0;"><span class=" aw5Odc" style="font-family: Times New Roman; font-size: 12pt; font-style: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline;"><a class="XqQF9c" href="mailto:dsaconf@yahoo.com" target="_blank"> dsaconf@yahoo.com</a></span><span class=" aw5Odc" style="font-family: Times New Roman; font-size: 11pt; font-style: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline;"><a class="XqQF9c" href="mailto:dsaconf@yahoo.com" target="_blank"> </a></span></p></div></div></div></div></div></div></div></div></div></section></div><div class="Xpil1b xgQ6eb"></div><footer jsname="yePe5c"><section id="h.45186a77f411eb4a_251" class="yaqOZd cJgDec nyKByd" style=""><div class="IFuOkc" style="background-size: cover; background-position: center center; background-image: url(https://lh3.googleusercontent.com/yA6KOVWa5qaNGBWs51oMUCHDsFhu5PWwom-nazSgcozLCC4AZ8RltyhZGL-5kXcQIy4GoAdP8e5l9zjF1ttDn8c=w16383);"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.45186a77f411eb4a_248" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><small id="h.ega4tnkfis9c" dir="ltr" class="CDt4Ke zfr3Q TMjjoe" style="display: block; text-align: center;"><span style="color: #f8f9fa; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong>Copyright © DSA 2020</strong></span><span style="color: #000000; font-family: Times New Roman; font-size: 12pt; font-style: normal; text-decoration: normal; vertical-align: baseline;"><strong> </strong></span></small></div></div></div></div></div></div></div></div></div></section></footer><div jscontroller="j1RDQb" jsaction="rcuQ6b:rcuQ6b;MxH79b:JdcaS;FaOgy:XuHpsb;" class="dZA9kd ynRLnc" data-last-updated-at-time="1608280522616" data-is-preview="false"><div role="button" class="U26fgb JRtysb WzwrXb I12f0b K2mXPb zXBiaf ynRLnc" jscontroller="iSvg6e" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;;keydown:I481le;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="0" aria-haspopup="true" aria-expanded="false" data-menu-corner="bottom-start" data-anchor-corner="top-start"><div class="NWlf3e MbhUzd" jsname="ksKsZd"></div><span jsslot class="MhXXcc oJeWuf"><span class="Lw7GHd snByac"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span><div jsname="xl07Ob" style="display:none" aria-hidden="true"><div class="JPdR6b hVNH5c" jscontroller="uY3Nvd" jsaction="IpSVtb:TvD9Pc;fEN2Ze:xzS4ub;frq95c:LNeFm;cFpp9e:J9oOtd; click:H8nU8b; mouseup:H8nU8b; keydown:I481le; keypress:Kr2w4b; blur:O22p3e; focus:H8nU8b" role="menu" tabindex="0" style="position:fixed"><div class="XvhY1d" jsaction="mousedown:p8EH2c; touchstart:p8EH2c;"><div class="JAPqpe K0NPx"><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Google Sites" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:Toy3n;" jsname="V2zOu"><div class="jO7h3c">Google Sites</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" data-disabled-tooltip="Report abuse is not available in preview mode" aria-label="Report abuse" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jscontroller="HYv29e" jsaction="JIbuQc:dQ6O0c;" jsname="lV5oke" data-abuse-proto="%.@.null,null,"https://sites.google.com/view/dsa--2020/accepted-papers"]" data-abuse-reporting-widget-proto="%.@.null,"https://sites.google.com/view/dsa--2020/accepted-papers"]"><div class="jO7h3c">Report abuse</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Page details" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:hriXLd;" jsname="Rg8K2c"><div class="jO7h3c">Page details</div></div></span></div></div></div></div></div></div><div jscontroller="j1RDQb" jsaction="focusin:gBxDVb(srlkmf); focusout:zvXhGb(srlkmf); click:ro2KTd(psdQ5e);JIbuQc:DSypkd(Bg3gkf);MxH79b:JdcaS;rcuQ6b:rcuQ6b;" class="LqzjUe ynRLnc" data-last-updated-at-time="1608280522616" data-is-preview="false"><div jsname="psdQ5e" class="Q0cSn"></div><div jsname="bN97Pc" class="hBW7Hb"><div role="button" class="U26fgb mUbCce fKz7Od kpPxtd QMuaBc M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="-1" aria-hidden="true"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span></div><div jsname="srlkmf" class="hUphyc"><div class="YkaBSd"><div class="iBkmkf"><span>Page updated</span> <span jsname="CFIm1b" class="dji00c" jsaction="AHmuwe:eGiyHb; mouseover:eGiyHb;" tabindex="0" role="contentinfo"></span></div></div><div class="YkaBSd" jsaction="click:Toy3n;"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow jsname="V2zOu" aria-disabled="false" tabindex="0">Google Sites</div></div><div class="YkaBSd" jscontroller="HYv29e" jsaction="click:dQ6O0c;" data-abuse-proto="%.@.null,null,"https://sites.google.com/view/dsa--2020/accepted-papers"]" data-abuse-reporting-widget-proto="%.@.null,"https://sites.google.com/view/dsa--2020/accepted-papers"]"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow aria-label="Report abuse" aria-disabled="false" tabindex="0">Report abuse</div></div></div></div></div></div></div></div><script nonce="QSuORaoVyfXEDaRAuFB2mg">DOCS_timing['cov']=new Date().getTime();</script><script src="https://www.gstatic.com/_/atari/_/js/k=atari.vw.en_US.fw_mAcuwUyE.O/am=MBiA/d=1/rs=AGEqA5lwNXFYaHUUDGYHiMqlOO36DqQAOw/m=view" id="base-js" nonce="QSuORaoVyfXEDaRAuFB2mg"></script></div></div><div jscontroller="YV8yqd" jsaction="rcuQ6b:npT2md"></div></body></html>