CINXE.COM
Accepted Papers
<!DOCTYPE html><html lang="en-US" itemscope itemtype="http://schema.org/WebPage"><head><meta charset="utf-8"><script nonce="A8oSP_HaJKvApzlLa1nfMA">var DOCS_timing={}; DOCS_timing['sl']=new Date().getTime();</script><script nonce="A8oSP_HaJKvApzlLa1nfMA">function _DumpException(e) {throw e;}</script><script data-id="_gd" nonce="A8oSP_HaJKvApzlLa1nfMA">window.WIZ_global_data = {"K1cgmc":"%.@.[null,null,null,[null,1,[1732002622,269095000]]]]","nQyAE":{}};</script><script nonce="A8oSP_HaJKvApzlLa1nfMA">_docs_flag_initialData={"atari-emtpr":false,"atari-eibrm":false,"docs-text-elei":false,"docs-text-usc":true,"atari-bae":false,"docs-text-emtps":true,"docs-text-etsrdpn":false,"docs-text-etsrds":false,"docs-text-endes":false,"docs-text-escpv":true,"docs-text-ecfs":false,"docs-text-ecis":true,"docs-text-eectfs":true,"docs-text-edctzs":true,"docs-text-eetxpc":false,"docs-text-eetxp":false,"docs-text-ertkmcp":true,"docs-text-ettctvs":false,"docs-text-ettts":true,"docs-text-escoubs":false,"docs-text-escivs":false,"docs-text-escitrbs":false,"docs-text-ecgvd":false,"docs-text-esbbcts":true,"docs-text-etccdts":false,"docs-text-etcchrs":false,"docs-text-etctrs":false,"docs-text-eltbbs":true,"docs-text-ecvdis":false,"docs-text-elaiabbs":false,"docs-text-eiosmc":false,"docs-text-ecslpo":false,"docs-text-etb":false,"docs-text-esbefr":false,"docs-text-ipi":false,"docs-etshc":false,"docs-text-tbcb":2.0E7,"docs-efsmsdl":false,"docs-text-etof":false,"docs-text-ehlb":false,"docs-text-epa":true,"docs-text-dwit":false,"docs-text-elawp":false,"docs-eec":false,"docs-ecot":"","docs-text-enbcr":false,"docs-sup":"","umss":false,"docs-eldi":false,"docs-dli":false,"docs-liap":"/logImpressions","ilcm":{"eui":"AHKXmL2h9jSN-b5MzziVEuk-CjvMdXr24q_YLS138lixcsRY-j9e2fQYJyYdi3nAhCSzc-8W4C4a","je":1,"sstu":1732690562973034,"si":"COv6i6z3-4kDFTucIwAdStMdQw","gsc":null,"ei":[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747261,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50561333,50561341,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71652840,71652848,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94327671,94327679,94353368,94353376,94390153,94390161,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444292,94444300,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086181,95086189,95087186,95087194,95087217,95087225,95112873,95112881,95118561,95118569,95135933,95135941,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95270945,95270953,95314802,95314810,95317975,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101606928,101606936,101617516,101617524,101631040,101631048,101705087,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101875084,101875092,101922739,101922747,102047762,102047770],"crc":0,"cvi":[]},"docs-ccdil":false,"docs-eil":true,"info_params":{},"buildLabel":"editors.sites-viewer-frontend_20241112.02_p1","docs-show_debug_info":false,"atari-jefp":"/_/view/jserror","docs-jern":"view","atari-rhpp":"/_/view","docs-ecuach":false,"docs-cclt":2033,"docs-ecci":true,"docs-esi":false,"docs-efypr":true,"docs-eyprp":true}; _docs_flag_cek= null ; if (window['DOCS_timing']) {DOCS_timing['ifdld']=new Date().getTime();}</script><meta name="viewport" content="width=device-width, initial-scale=1"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="referrer" content="origin"><link rel="icon" href="https://lh6.googleusercontent.com/3x9A_1Wc8wx6rhg2c7s-wYyggvvAatFC4-L91oA1zyuu4XAlSf-aXf10_TloV83VGdemh6uORcTCpN2IjsdFP72TKPM0QlXLlOuJzHOCPG1c8Q"><meta property="og:title" content="Accepted Papers"><meta property="og:type" content="website"><meta property="og:url" content="https://sites.google.com/view/nc2022/accepted-papers"><meta property="og:description" content=" Accepted Papers Multi-View Human Tracking and 3D Localization in Retail Akash Jadhav, Noque.store (Startup), India ABSTRACT In recent years, retail stores have seen traction in bringing online shopping experience to offline stores via autonomous checkouts. Autonomous checkouts is a computer"><meta itemprop="name" content="Accepted Papers"><meta itemprop="description" content=" Accepted Papers Multi-View Human Tracking and 3D Localization in Retail Akash Jadhav, Noque.store (Startup), India ABSTRACT In recent years, retail stores have seen traction in bringing online shopping experience to offline stores via autonomous checkouts. Autonomous checkouts is a computer"><meta itemprop="url" content="https://sites.google.com/view/nc2022/accepted-papers"><meta itemprop="thumbnailUrl" content="https://lh3.googleusercontent.com/OQ7rXhE-yAAoVkjsntwPdCassoNC-Rdc3HYmyC0jpC8AJhd2IJCHnHEHHVfW7vCle8bt5bz-VF9Lm4bPOc5cFIk=w16383"><meta itemprop="image" content="https://lh3.googleusercontent.com/OQ7rXhE-yAAoVkjsntwPdCassoNC-Rdc3HYmyC0jpC8AJhd2IJCHnHEHHVfW7vCle8bt5bz-VF9Lm4bPOc5cFIk=w16383"><meta itemprop="imageUrl" content="https://lh3.googleusercontent.com/OQ7rXhE-yAAoVkjsntwPdCassoNC-Rdc3HYmyC0jpC8AJhd2IJCHnHEHHVfW7vCle8bt5bz-VF9Lm4bPOc5cFIk=w16383"><meta property="og:image" content="https://lh3.googleusercontent.com/OQ7rXhE-yAAoVkjsntwPdCassoNC-Rdc3HYmyC0jpC8AJhd2IJCHnHEHHVfW7vCle8bt5bz-VF9Lm4bPOc5cFIk=w16383"><link href="https://fonts.googleapis.com/css?family=Lato%3A300%2C300italic%2C400%2C400italic%2C700%2C700italic&display=swap" rel="stylesheet" nonce="w8I70aLU4EsZkFROJyymnQ"><link href="https://fonts.googleapis.com/css?family=Google+Sans:400,500|Roboto:300,400,500,700|Source+Code+Pro:400,700&display=swap" rel="stylesheet" nonce="w8I70aLU4EsZkFROJyymnQ"><style nonce="w8I70aLU4EsZkFROJyymnQ">@media only screen and (max-width: 479px){.jgG6ef{font-size: 17.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.jgG6ef{font-size: 17.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.jgG6ef{font-size: 18.0pt;}}@media only screen and (min-width: 1280px){.jgG6ef{font-size: 18.0pt;}}</style><link rel="stylesheet" href="https://www.gstatic.com/_/atari/_/ss/k=atari.vw.7R57rYYVGiA.L.X.O/am=MBiA/d=1/rs=AGEqA5nH97dOwqY0iGblvGlWiaR59owncA" data-id="_cl" nonce="w8I70aLU4EsZkFROJyymnQ"><script nonce="A8oSP_HaJKvApzlLa1nfMA"></script><title>Accepted Papers</title><style jsname="ptDGoc" nonce="w8I70aLU4EsZkFROJyymnQ">.M63kCb{background-color: rgba(255,255,255,1);}.OUGEr{color: rgba(33,33,33,1);}.duRjpb .OUGEr{color: rgba(34,110,147,1);}.JYVBee .OUGEr{color: rgba(34,110,147,1);}.OmQG5e .OUGEr{color: rgba(33,33,33,1);}.iwQgFb{background-color: rgba(0,0,0,0.150000006);}.ySLm4c{font-family: Lato, sans-serif;}.CbiMKe{background-color: rgba(30,108,147,1);}.qeLZfd .zfr3Q{color: rgba(33,33,33,1);}.qeLZfd .qnVSj{color: rgba(33,33,33,1);}.qeLZfd .Glwbz{color: rgba(33,33,33,1);}.qeLZfd .duRjpb{color: rgba(34,110,147,1);}.qeLZfd .qLrapd{color: rgba(34,110,147,1);}.qeLZfd .JYVBee{color: rgba(34,110,147,1);}.qeLZfd .aHM7ed{color: rgba(34,110,147,1);}.qeLZfd .OmQG5e{color: rgba(33,33,33,1);}.qeLZfd .NHD4Gf{color: rgba(33,33,33,1);}.qeLZfd .aw5Odc{color: rgba(0,101,128,1);}.qeLZfd .dhtgD:hover{color: rgba(0,0,0,1);}.qeLZfd .dhtgD:visited{color: rgba(0,101,128,1);}.qeLZfd .iwQgFb{background-color: rgba(0,0,0,0.150000006);}.qeLZfd .OUGEr{color: rgba(33,33,33,1);}.qeLZfd .duRjpb .OUGEr{color: rgba(34,110,147,1);}.qeLZfd .JYVBee .OUGEr{color: rgba(34,110,147,1);}.qeLZfd .OmQG5e .OUGEr{color: rgba(33,33,33,1);}.qeLZfd:before{background-color: rgba(242,242,242,1); display: block;}.lQAHbd .zfr3Q{color: rgba(255,255,255,1);}.lQAHbd .qnVSj{color: rgba(255,255,255,1);}.lQAHbd .Glwbz{color: rgba(255,255,255,1);}.lQAHbd .duRjpb{color: rgba(255,255,255,1);}.lQAHbd .qLrapd{color: rgba(255,255,255,1);}.lQAHbd .JYVBee{color: rgba(255,255,255,1);}.lQAHbd .aHM7ed{color: rgba(255,255,255,1);}.lQAHbd .OmQG5e{color: rgba(255,255,255,1);}.lQAHbd .NHD4Gf{color: rgba(255,255,255,1);}.lQAHbd .aw5Odc{color: rgba(255,255,255,1);}.lQAHbd .dhtgD:hover{color: rgba(255,255,255,1);}.lQAHbd .dhtgD:visited{color: rgba(255,255,255,1);}.lQAHbd .iwQgFb{background-color: rgba(255,255,255,0.150000006);}.lQAHbd .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .duRjpb .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .JYVBee .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .OmQG5e .OUGEr{color: rgba(255,255,255,1);}.lQAHbd .CbiMKe{background-color: rgba(255,255,255,1);}.lQAHbd:before{background-color: rgba(30,108,147,1); display: block;}.cJgDec .zfr3Q{color: rgba(255,255,255,1);}.cJgDec .zfr3Q .OUGEr{color: rgba(255,255,255,1);}.cJgDec .qnVSj{color: rgba(255,255,255,1);}.cJgDec .Glwbz{color: rgba(255,255,255,1);}.cJgDec .qLrapd{color: rgba(255,255,255,1);}.cJgDec .aHM7ed{color: rgba(255,255,255,1);}.cJgDec .NHD4Gf{color: rgba(255,255,255,1);}.cJgDec .IFuOkc:before{background-color: rgba(33,33,33,1); opacity: 0; display: block;}.O13XJf{height: 340px; padding-bottom: 60px; padding-top: 60px;}.O13XJf .IFuOkc{background-color: rgba(34,110,147,1); background-image: url(https://ssl.gstatic.com/atari/images/simple-header-blended-small.png);}.O13XJf .IFuOkc:before{background-color: rgba(33,33,33,1); opacity: 0.4; display: block;}.O13XJf .zfr3Q{color: rgba(255,255,255,1);}.O13XJf .qnVSj{color: rgba(255,255,255,1);}.O13XJf .Glwbz{color: rgba(255,255,255,1);}.O13XJf .duRjpb{color: rgba(255,255,255,1);}.O13XJf .qLrapd{color: rgba(255,255,255,1);}.O13XJf .JYVBee{color: rgba(255,255,255,1);}.O13XJf .aHM7ed{color: rgba(255,255,255,1);}.O13XJf .OmQG5e{color: rgba(255,255,255,1);}.O13XJf .NHD4Gf{color: rgba(255,255,255,1);}.tpmmCb .zfr3Q{color: rgba(33,33,33,1);}.tpmmCb .zfr3Q .OUGEr{color: rgba(33,33,33,1);}.tpmmCb .qnVSj{color: rgba(33,33,33,1);}.tpmmCb .Glwbz{color: rgba(33,33,33,1);}.tpmmCb .qLrapd{color: rgba(33,33,33,1);}.tpmmCb .aHM7ed{color: rgba(33,33,33,1);}.tpmmCb .NHD4Gf{color: rgba(33,33,33,1);}.tpmmCb .IFuOkc:before{background-color: rgba(255,255,255,1); display: block;}.tpmmCb .Wew9ke{fill: rgba(33,33,33,1);}.aw5Odc{color: rgba(0,101,128,1);}.dhtgD:hover{color: rgba(0,122,147,1);}.dhtgD:active{color: rgba(0,122,147,1);}.dhtgD:visited{color: rgba(0,101,128,1);}.Zjiec{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 19pt; font-weight: 300; letter-spacing: 1px; line-height: 1.3; padding-bottom: 62.5px; padding-left: 48px; padding-right: 36px; padding-top: 11.5px;}.XMyrgf{margin-top: 0px; margin-left: 48px; margin-bottom: 24px; margin-right: 24px;}.TlfmSc{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 15pt; font-weight: 300; line-height: 1.333;}.Mz8gvb{color: rgba(255,255,255,1);}.zDUgLc{background-color: rgba(33,33,33,1);}.QTKDff.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.YTv4We{color: rgba(178,178,178,1);}.YTv4We:hover:before{background-color: rgba(255,255,255,0.1199999973); display: block;}.YTv4We.chg4Jd:focus:before{border-color: rgba(255,255,255,0.3600000143); display: block;}.eWDljc{background-color: rgba(33,33,33,1);}.eWDljc .hDrhEe{padding-left: 8px;}.ZXW7w{color: rgba(255,255,255,1); opacity: 0.26;}.PsKE7e{color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 12pt; font-weight: 300;}.lhZOrc{color: rgba(73,170,212,1);}.hDrhEe:hover{color: rgba(73,170,212,1);}.M9vuGd{color: rgba(73,170,212,1); font-weight: 400;}.jgXgSe:hover{color: rgba(73,170,212,1);}.j10yRb:hover{color: rgba(0,188,212,1);}.j10yRb.chg4Jd:focus:before{border-color: rgba(255,255,255,0.3600000143); display: block;}.tCHXDc{color: rgba(255,255,255,1);}.iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.wgxiMe{background-color: rgba(33,33,33,1);}.fOU46b .TlfmSc{color: rgba(255,255,255,1);}.fOU46b .KJll8d{background-color: rgba(255,255,255,1);}.fOU46b .Mz8gvb{color: rgba(255,255,255,1);}.fOU46b .Mz8gvb.chg4Jd:focus:before{border-color: rgba(255,255,255,1); display: block;}.fOU46b .qV4dIc{color: rgba(255,255,255,0.8700000048);}.fOU46b .jgXgSe:hover{color: rgba(255,255,255,1);}.fOU46b .M9vuGd{color: rgba(255,255,255,1);}.fOU46b .tCHXDc{color: rgba(255,255,255,0.8700000048);}.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.fOU46b .G8QRnc .Mz8gvb{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .Mz8gvb.chg4Jd:focus:before{border-color: rgba(0,0,0,0.8000000119); display: block;}.fOU46b .G8QRnc .ZXW7w{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .TlfmSc{color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .KJll8d{background-color: rgba(0,0,0,0.8000000119);}.fOU46b .G8QRnc .qV4dIc{color: rgba(0,0,0,0.6399999857);}.fOU46b .G8QRnc .jgXgSe:hover{color: rgba(0,0,0,0.8199999928);}.fOU46b .G8QRnc .M9vuGd{color: rgba(0,0,0,0.8199999928);}.fOU46b .G8QRnc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .G8QRnc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .usN8rf .Mz8gvb{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .Mz8gvb.chg4Jd:focus:before{border-color: rgba(0,0,0,0.8000000119); display: block;}.fOU46b .usN8rf .ZXW7w{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .TlfmSc{color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .KJll8d{background-color: rgba(0,0,0,0.8000000119);}.fOU46b .usN8rf .qV4dIc{color: rgba(0,0,0,0.6399999857);}.fOU46b .usN8rf .jgXgSe:hover{color: rgba(0,0,0,0.8199999928);}.fOU46b .usN8rf .M9vuGd{color: rgba(0,0,0,0.8199999928);}.fOU46b .usN8rf .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .usN8rf .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .aCIEDd .qV4dIc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .TlfmSc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .KJll8d{background-color: rgba(33,33,33,1);}.fOU46b .aCIEDd .ZXW7w{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .jgXgSe:hover{color: rgba(33,33,33,1); opacity: 0.82;}.fOU46b .aCIEDd .Mz8gvb{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .tCHXDc{color: rgba(33,33,33,1);}.fOU46b .aCIEDd .iWs3gf.chg4Jd:focus{background-color: rgba(33,33,33,0.1199999973);}.fOU46b .a3ETed .qV4dIc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .TlfmSc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .KJll8d{background-color: rgba(255,255,255,1);}.fOU46b .a3ETed .ZXW7w{color: rgba(255,255,255,1);}.fOU46b .a3ETed .jgXgSe:hover{color: rgba(255,255,255,1); opacity: 0.82;}.fOU46b .a3ETed .Mz8gvb{color: rgba(255,255,255,1);}.fOU46b .a3ETed .tCHXDc{color: rgba(255,255,255,1);}.fOU46b .a3ETed .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.XeSM4.b2Iqye.fOU46b .LBrwzc .tCHXDc{color: rgba(255,255,255,0.8700000048);}}.XeSM4.b2Iqye.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}@media only screen and (min-width: 1280px){.KuNac.b2Iqye.fOU46b .tCHXDc{color: rgba(0,0,0,0.6399999857);}}.KuNac.b2Iqye.fOU46b .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .zDUgLc{opacity: 0;}.LBrwzc .ZXW7w{color: rgba(0,0,0,1);}.LBrwzc .KJll8d{background-color: rgba(0,0,0,1);}.GBy4H .ZXW7w{color: rgba(255,255,255,1);}.GBy4H .KJll8d{background-color: rgba(255,255,255,1);}.eBSUbc{background-color: rgba(33,33,33,1); color: rgba(0,188,212,0.6999999881);}.BFDQOb:hover{color: rgba(73,170,212,1);}.ImnMyf{background-color: rgba(255,255,255,1); color: rgba(33,33,33,1);}.Vs12Bd{background-color: rgba(242,242,242,1); color: rgba(33,33,33,1);}.S5d9Rd{background-color: rgba(30,108,147,1); color: rgba(255,255,255,1);}.zfr3Q{color: rgba(33,33,33,1); font-family: Lato, sans-serif; font-size: 11pt; font-weight: 400; line-height: 1.6667; margin-top: 12px;}.qnVSj{color: rgba(33,33,33,1);}.Glwbz{color: rgba(33,33,33,1);}.duRjpb{color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 34pt; font-weight: 300; letter-spacing: 0.5px; line-height: 1.2; margin-top: 30px;}.Ap4VC{margin-bottom: -30px;}.qLrapd{color: rgba(34,110,147,1);}.JYVBee{color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 19pt; font-weight: 400; line-height: 1.4; margin-top: 20px;}.CobnVe{margin-bottom: -20px;}.aHM7ed{color: rgba(34,110,147,1);}.OmQG5e{color: rgba(33,33,33,1); font-family: Lato, sans-serif; font-size: 15pt; font-style: normal; font-weight: 400; line-height: 1.25; margin-top: 16px;}.GV3q8e{margin-bottom: -16px;}.NHD4Gf{color: rgba(33,33,33,1);}.LB7kq .duRjpb{font-size: 64pt; letter-spacing: 2px; line-height: 1; margin-top: 40px;}.LB7kq .JYVBee{font-size: 25pt; font-weight: 300; line-height: 1.1; margin-top: 25px;}@media only screen and (max-width: 479px){.LB7kq .duRjpb{font-size: 40pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.LB7kq .duRjpb{font-size: 53pt;}}@media only screen and (max-width: 479px){.LB7kq .JYVBee{font-size: 19pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.LB7kq .JYVBee{font-size: 22pt;}}.O13XJf{height: 340px; padding-bottom: 60px; padding-top: 60px;}@media only screen and (min-width: 480px) and (max-width: 767px){.O13XJf{height: 280px; padding-bottom: 40px; padding-top: 40px;}}@media only screen and (max-width: 479px){.O13XJf{height: 250px; padding-bottom: 30px; padding-top: 30px;}}.SBrW1{height: 520px;}@media only screen and (min-width: 480px) and (max-width: 767px){.SBrW1{height: 520px;}}@media only screen and (max-width: 479px){.SBrW1{height: 400px;}}.Wew9ke{fill: rgba(255,255,255,1);}.gk8rDe{height: 180px; padding-bottom: 32px; padding-top: 60px;}.gk8rDe .zfr3Q{color: rgba(0,0,0,1);}.gk8rDe .duRjpb{color: rgba(34,110,147,1); font-size: 45pt; line-height: 1.1;}.gk8rDe .qLrapd{color: rgba(34,110,147,1);}.gk8rDe .JYVBee{color: rgba(34,110,147,1); font-size: 27pt; line-height: 1.35; margin-top: 15px;}.gk8rDe .aHM7ed{color: rgba(34,110,147,1);}.gk8rDe .OmQG5e{color: rgba(33,33,33,1);}.gk8rDe .NHD4Gf{color: rgba(33,33,33,1);}@media only screen and (max-width: 479px){.gk8rDe .duRjpb{font-size: 30pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .duRjpb{font-size: 38pt;}}@media only screen and (max-width: 479px){.gk8rDe .JYVBee{font-size: 20pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe .JYVBee{font-size: 24pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.gk8rDe{padding-top: 45px;}}@media only screen and (max-width: 479px){.gk8rDe{padding-bottom: 0px; padding-top: 30px;}}.dhtgD{text-decoration: underline;}.JzO0Vc{background-color: rgba(33,33,33,1); font-family: Lato, sans-serif; width: 250px;}@media only screen and (min-width: 1280px){.JzO0Vc{padding-top: 48.5px;}}.TlfmSc{font-family: Lato, sans-serif; font-size: 15pt; font-weight: 300; line-height: 1.333;}.PsKE7e{font-family: Lato, sans-serif; font-size: 12pt;}.IKA38e{line-height: 1.21;}.hDrhEe{padding-bottom: 11.5px; padding-top: 11.5px;}.zDUgLc{opacity: 1;}.QmpIrf{background-color: rgba(30,108,147,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal; line-height: normal;}.KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.lQAHbd .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.lQAHbd .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.lQAHbd .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.lQAHbd .Mt0nFe{border-color: rgba(255,255,255,0.200000003);}.cJgDec .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.cJgDec .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.cJgDec .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.tpmmCb .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.tpmmCb .KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.tpmmCb .KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.gk8rDe .QmpIrf{background-color: rgba(30,108,147,1); border-color: rgba(255,255,255,1); color: rgba(255,255,255,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .xkUom{border-color: rgba(30,108,147,1); color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .xkUom:hover{background-color: rgba(30,108,147,0.1000000015);}.gk8rDe .KjwKmc{color: rgba(30,108,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.gk8rDe .KjwKmc:hover{background-color: rgba(30,108,147,0.1000000015);}.O13XJf .QmpIrf{background-color: rgba(255,255,255,1); border-color: rgba(34,110,147,1); color: rgba(34,110,147,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .xkUom{border-color: rgba(242,242,242,1); color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .xkUom:hover{background-color: rgba(255,255,255,0.1000000015);}.O13XJf .KjwKmc{color: rgba(242,242,242,1); font-family: Lato, sans-serif; font-size: 11pt; line-height: normal;}.O13XJf .KjwKmc:hover{background-color: rgba(255,255,255,0.1000000015);}.Y4CpGd{font-family: Lato, sans-serif; font-size: 11pt;}.CMArNe{background-color: rgba(242,242,242,1);}.LBrwzc .TlfmSc{color: rgba(0,0,0,0.8000000119);}.LBrwzc .YTv4We{color: rgba(0,0,0,0.6399999857);}.LBrwzc .YTv4We.chg4Jd:focus:before{border-color: rgba(0,0,0,0.6399999857); display: block;}.LBrwzc .Mz8gvb{color: rgba(0,0,0,0.6399999857);}.LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.LBrwzc .wgxiMe{background-color: rgba(255,255,255,1);}.LBrwzc .qV4dIc{color: rgba(0,0,0,0.6399999857);}.LBrwzc .M9vuGd{color: rgba(0,0,0,0.8000000119); font-weight: bold;}.LBrwzc .Zjiec{color: rgba(0,0,0,0.8000000119);}.LBrwzc .IKA38e{color: rgba(0,0,0,0.6399999857);}.LBrwzc .lhZOrc.IKA38e{color: rgba(0,0,0,0.8000000119); font-weight: bold;}.LBrwzc .j10yRb:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .eBSUbc{color: rgba(0,0,0,0.8000000119);}.LBrwzc .hDrhEe:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .jgXgSe:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .M9vuGd:hover{color: rgba(0,0,0,0.8000000119);}.LBrwzc .zDUgLc{border-bottom-color: rgba(204,204,204,1); border-bottom-width: 1px; border-bottom-style: solid;}.fOU46b .LBrwzc .M9vuGd{color: rgba(0,0,0,0.8000000119);}.fOU46b .LBrwzc .jgXgSe:hover{color: rgba(0,0,0,0.8000000119);}.fOU46b .LBrwzc .zDUgLc{opacity: 1; border-bottom-style: none;}.fOU46b .LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.fOU46b .GBy4H .M9vuGd{color: rgba(255,255,255,1);}.fOU46b .GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.fOU46b .GBy4H .zDUgLc{opacity: 1;}.fOU46b .GBy4H .tCHXDc{color: rgba(255,255,255,0.8700000048);}.fOU46b .GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.XeSM4.G9Qloe.fOU46b .LBrwzc .tCHXDc{color: rgba(0,0,0,0.6399999857);}.XeSM4.G9Qloe.fOU46b .LBrwzc .iWs3gf.chg4Jd:focus{background-color: rgba(0,0,0,0.1199999973);}.GBy4H .lhZOrc.IKA38e{color: rgba(255,255,255,1);}.GBy4H .eBSUbc{color: rgba(255,255,255,0.8700000048);}.GBy4H .hDrhEe:hover{color: rgba(255,255,255,1);}.GBy4H .j10yRb:hover{color: rgba(255,255,255,1);}.GBy4H .YTv4We{color: rgba(255,255,255,1);}.GBy4H .YTv4We.chg4Jd:focus:before{border-color: rgba(255,255,255,1); display: block;}.GBy4H .tCHXDc{color: rgba(255,255,255,0.8700000048);}.GBy4H .iWs3gf.chg4Jd:focus{background-color: rgba(255,255,255,0.1199999973);}.GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.GBy4H .jgXgSe:hover{color: rgba(255,255,255,1);}.GBy4H .M9vuGd{color: rgba(255,255,255,1);}.GBy4H .M9vuGd:hover{color: rgba(255,255,255,1);}.QcmuFb{padding-left: 20px;}.vDPrib{padding-left: 40px;}.TBDXjd{padding-left: 60px;}.bYeK8e{padding-left: 80px;}.CuqSDe{padding-left: 100px;}.Havqpe{padding-left: 120px;}.JvDrRe{padding-left: 140px;}.o5lrIf{padding-left: 160px;}.yOJW7c{padding-left: 180px;}.rB8cye{padding-left: 200px;}.RuayVd{padding-right: 20px;}.YzcKX{padding-right: 40px;}.reTV0b{padding-right: 60px;}.vSYeUc{padding-right: 80px;}.PxtZIe{padding-right: 100px;}.ahQMed{padding-right: 120px;}.rzhcXb{padding-right: 140px;}.PBhj0b{padding-right: 160px;}.TlN46c{padding-right: 180px;}.GEdNnc{padding-right: 200px;}.TMjjoe{font-family: Lato, sans-serif; font-size: 9pt; line-height: 1.2; margin-top: 0px;}@media only screen and (min-width: 1280px){.yxgWrb{margin-left: 250px;}}@media only screen and (max-width: 479px){.Zjiec{font-size: 15pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.Zjiec{font-size: 17pt;}}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12pt;}}@media only screen and (max-width: 479px){.duRjpb{font-size: 24pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.duRjpb{font-size: 29pt;}}@media only screen and (max-width: 479px){.JYVBee{font-size: 15pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.JYVBee{font-size: 17pt;}}@media only screen and (max-width: 479px){.OmQG5e{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.OmQG5e{font-size: 14pt;}}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12pt;}}@media only screen and (max-width: 479px){.TMjjoe{font-size: 9pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TMjjoe{font-size: 9pt;}}section[id="h.2daa57406ec4dd68_33"] .IFuOkc:before{opacity: 0.3;}</style><script nonce="A8oSP_HaJKvApzlLa1nfMA">_at_config = [null,"AIzaSyChg3MFqzdi1P5J-YvEyakkSA1yU7HRcDI","897606708560-a63d8ia0t9dhtpdt4i3djab2m42see7o.apps.googleusercontent.com",null,null,null,null,null,null,null,null,null,null,null,"SITES_%s",null,null,null,null,null,null,null,null,null,["AHKXmL2h9jSN-b5MzziVEuk-CjvMdXr24q_YLS138lixcsRY-j9e2fQYJyYdi3nAhCSzc-8W4C4a",1,"COv6i6z3-4kDFTucIwAdStMdQw",1732690562973034,[5703839,5704621,5706832,5706836,5707711,5737784,5737800,5738513,5738529,5740798,5740814,5743108,5743124,5747261,5748013,5748029,5752678,5752694,5753313,5753329,5754213,5754229,5755080,5755096,5758807,5758823,5762243,5762259,5764252,5764268,5765535,5765551,5766761,5766777,5773662,5773678,5774331,5774347,5774836,5774852,5776501,5776517,5784931,5784947,5784951,5784967,5791766,5791782,5796457,5796473,14101306,14101502,14101510,14101534,49372435,49372443,49375314,49375322,49472063,49472071,49622823,49622831,49623173,49623181,49643568,49643576,49644015,49644023,49769337,49769345,49822921,49822929,49823164,49823172,49833462,49833470,49842855,49842863,49924706,49924714,50221720,50221728,50266222,50266230,50273528,50273536,50297076,50297084,50297426,50297434,50498907,50498915,50529103,50529111,50561333,50561341,50586962,50586970,70971256,70971264,71035517,71035525,71038255,71038263,71079938,71079946,71085241,71085249,71185170,71185178,71197826,71197834,71238946,71238954,71289146,71289154,71387889,71387897,71429507,71429515,71478200,71478208,71478589,71478597,71502841,71502849,71528597,71528605,71530083,71530091,71544834,71544842,71545513,71545521,71546425,71546433,71560069,71560077,71561541,71561549,71573870,71573878,71642103,71642111,71652840,71652848,71658040,71658048,71659813,71659821,71689860,71689868,71699841,71699849,71720760,71721087,71721095,71733083,71733091,71798420,71798436,71798440,71798456,71849655,71849663,71882106,71882114,71897827,71897835,71960540,71960548,71961126,71961134,94327671,94327679,94353368,94353376,94390153,94390161,94413607,94413615,94420737,94420745,94434257,94434265,94435578,94435586,94444292,94444300,94484634,94484642,94489858,94489866,94502654,94502662,94526768,94526776,94545004,94545012,94597639,94597647,94630911,94661802,94661810,94707424,94707432,94784571,94784579,94875009,94875017,94904089,94904097,94929210,94929218,94942490,94942498,95065889,95065897,95086181,95086189,95087186,95087194,95087217,95087225,95112873,95112881,95118561,95118569,95135933,95135941,95234185,95234871,95234879,95251262,95251270,95254920,95254928,95270945,95270953,95314802,95314810,95317975,99237681,99237689,99247596,99247604,99310979,99310987,99338440,99338448,99368792,99368800,99401881,99401889,99402331,99402339,99437441,99437449,99460069,100130662,100130678,101406734,101406742,101442805,101442813,101456452,101456460,101488823,101488831,101489187,101489195,101507186,101507194,101519280,101519288,101606928,101606936,101617516,101617524,101631040,101631048,101705087,101708583,101708591,101771970,101771978,101776366,101776374,101783430,101783446,101875084,101875092,101922739,101922747,102047762,102047770]],null,null,null,null,0,null,null,null,null,null,null,null,null,null,"https://drive.google.com",null,null,null,null,null,null,null,null,null,0,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"v2internal","https://docs.google.com",null,null,null,null,null,null,"https://sites.google.com/new/",null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,"",null,null,null,null,null,null,null,null,null,null,null,null,6,null,null,"https://accounts.google.com/o/oauth2/auth","https://accounts.google.com/o/oauth2/postmessageRelay",null,null,null,null,78,"https://sites.google.com/new/?usp\u003dviewer_footer",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://www.gstatic.com/atari/embeds/83a60601c213b72fb19c1855fb0c5f26/intermediate-frame-minified.html",0,null,"v2beta",null,null,null,null,null,null,4,"https://accounts.google.com/o/oauth2/iframe",null,null,null,null,null,null,"https://450333112-atari-embeds.googleusercontent.com/embeds/16cb204cf3a9d4d223a0a3fd8b0eec5d/inner-frame-minified.html",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://sites.google.com/view/nc2022/accepted-papers",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,0,null,"",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,[1732690562974,"editors.sites-viewer-frontend_20241112.02_p1","695977640",null,1,1,""],null,null,null,null,0,null,null,0,null,null,null,null,null,null,null,null,20,500,"https://domains.google.com",null,0,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,1,0,1,0,0,0,0,null,null,null,null,null,"https://www.google.com/calendar/embed",null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,"PROD",0,null,0,null,1]; window.globals = {"enableAnalytics":true,"webPropertyId":"","showDebug":false,"hashedSiteId":"b6b6d26f00235d520ebf6c125d4106f326fafd49c8e3ca4dc18f11ea1b6603cc","normalizedPath":"view/nc2022/accepted-papers","pageTitle":"Accepted Papers"}; function gapiLoaded() {if (globals.gapiLoaded == undefined) {globals.gapiLoaded = true;} else {globals.gapiLoaded();}}window.messages = []; window.addEventListener && window.addEventListener('message', function(e) {if (window.messages && e.data && e.data.magic == 'SHIC') {window.messages.push(e);}});</script><script src="https://apis.google.com/js/client.js?onload=gapiLoaded" nonce="A8oSP_HaJKvApzlLa1nfMA"></script><script nonce="A8oSP_HaJKvApzlLa1nfMA">(function(){}).call(this); </script><script nonce="A8oSP_HaJKvApzlLa1nfMA">const imageUrl = 'https:\/\/lh4.googleusercontent.com\/e7d_MnDYplZdfwoUs2IbuVk9h3lfoUNvQGhYSUsOhfH6M40AecXU_X7DghgSzh8AkSb9tNrvN8qnYOvidVs144o\x3dw16383'; function bgImgLoaded() { if (!globals.headerBgImgLoaded) { globals.headerBgImgLoaded = new Date().getTime(); } else { globals.headerBgImgLoaded(); } } if (imageUrl) { const img = new Image(); img.src = imageUrl; img.onload = bgImgLoaded; globals.headerBgImgExists = true; } else { globals.headerBgImgExists = false; } </script></head><body dir="ltr" itemscope itemtype="http://schema.org/WebPage" id="yDmH0d" css="yDmH0d"><div jscontroller="pc62j" jsmodel="iTeaXe" jsaction="rcuQ6b:WYd;GvneHb:og1FDd;vbaUQc:uAM5ec;"><div id="docs-banner-container"><div id="docs-banners"><div id="HB1eCd-mzNpsf-r8s4j-ORHb"></div><div id="HB1eCd-TZk80d-r8s4j-ORHb" aria-live="assertive" aria-atomic="true"></div></div><div class="HB1eCd-Vkfede-NBtyUd-PvRhvb-LwH6nd"></div></div><div jscontroller="X4BaPc" jsaction="rcuQ6b:WYd;o6xM5b:Pg9eo;HuL2Hd:mHeCvf;VMhF5:FFYy5e;sk3Qmb:HI1Mdd;JIbuQc:rSzFEd(z2EeY),aSaF6e(ilzYPe);"><div jscontroller="o1L5Wb" data-sitename="nc2022" data-search-scope="1" data-universe="1" jsmodel="fNFZH" jsaction="Pe9H6d:cZFEp;WMZaJ:VsGN3;hJluRd:UADL7b;zuqEgd:HI9w0;tr6QDd:Y8aXB;MxH79b:xDkBfb;JIbuQc:SPXMTb(uxAMZ),LjG1Ed(a6mxbb);" jsname="G0jgYd"><div jsname="gYwusb" class="p9b27"></div><div jscontroller="RrXLpc" jsname="XeeWQc" role="banner" jsaction="keydown:uiKYid(OH0EC);rcuQ6b:WYd;zuqEgd:ufqpf;JIbuQc:XfTnxb(lfEfFf),AlTiYc(GeGHKb),AlTiYc(m1xNUe),zZlNMe(pZn8Oc);YqO5N:ELcyfe;"><div jsname="bF1uUb" class="BuY5Fd" jsaction="click:xVuwSc;"></div><div jsname="MVsrn" class="TbNlJb "><div role="button" class="U26fgb mUbCce fKz7Od h3nfre M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="GeGHKb" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div><div class="E2UJ5" jsname="M6JdT"><div class="rFrNMe b7AJhc zKHdkd" jscontroller="pxq3x" jsaction="clickonly:KjsqPd; focus:Jt1EX; blur:fpfTEe; input:Lg5SV" jsshadow jsname="OH0EC" aria-expanded="true"><div class="aCsJod oJeWuf"><div class="aXBtI I0VJ4d Wic03c"><span jsslot class="A37UZe qgcB3c iHd5yb"><div role="button" class="U26fgb mUbCce fKz7Od i3PoXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="lfEfFf" aria-label="Search" aria-disabled="false" tabindex="0" data-tooltip="Search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div><div class="EmVfjc SKShhf" data-loadingmessage="Loading…" jscontroller="qAKInc" jsaction="animationend:kWijWc;dyRcpb:dyRcpb" jsname="aZ2wEe"><div class="Cg7hO" aria-live="assertive" jsname="vyyg5"></div><div jsname="Hxlbvc" class="xu46lf"><div class="ir3uv uWlRce co39ub"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv GFoASc Cn087"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv WpeOqd hfsr6b"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv rHV3jf EjXFBf"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div></div></div><div role="button" class="U26fgb mUbCce fKz7Od JyJRXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="m1xNUe" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div></span><div class="Xb9hP"><input type="search" class="whsOnd zHQkBf" jsname="YPqjbf" autocomplete="off" tabindex="0" aria-label="Search this site" value="" aria-disabled="false" autofocus role="combobox" data-initial-value=""/><div jsname="LwH6nd" class="ndJi5d snByac" aria-hidden="true">Search this site</div></div><span jsslot class="A37UZe sxyYjd MQL3Ob"><div role="button" class="U26fgb mUbCce fKz7Od Kk06A M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="pZn8Oc" aria-label="Clear search" aria-disabled="false" tabindex="0" data-tooltip="Clear search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="fAUEUd" viewBox="0 0 24 24" focusable="false"><path d="M19 6.41L17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12z"></path><path d="M0 0h24v24H0z" fill="none"></path></svg></span></span></div></span><div class="i9lrp mIZh1c"></div><div jsname="XmnwAc" class="OabDMe cXrdqd"></div></div></div><div class="LXRPh"><div jsname="ty6ygf" class="ovnfwe Is7Fhb"></div></div></div></div></div></div></div><div jsname="tiN4bf"><style nonce="w8I70aLU4EsZkFROJyymnQ">.rrJNTc{opacity: 0;}.bKy5e{pointer-events: none; position: absolute; top: 0;}</style><div class="bKy5e"><div class="rrJNTc" tabindex="-1"><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf jz7fPb" jsname="z2EeY" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to main content</span></button></div><div class="VfPpkd-dgl2Hf-ppHlrf-sM5MNb" data-is-touch-wrapper='true'><button class="VfPpkd-LgbsSe VfPpkd-LgbsSe-OWXEXe-dgl2Hf LjDxcd XhPA0b LQeN7 WsSUlf br90J" jscontroller="soHxf" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc; touchcancel:JMtRjd; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;mlnRJb:fLiPzd;" data-idom-class="LjDxcd XhPA0b LQeN7 WsSUlf br90J" jsname="ilzYPe" tabindex="0"><div class="VfPpkd-Jh9lGc"></div><div class="VfPpkd-J1Ukfc-LhBDec"></div><div class="VfPpkd-RLmnJb"></div><span jsname="V67aGc" class="VfPpkd-vQzf8d">Skip to navigation</span></button></div></div></div><div class="M63kCb N63NQ"></div><div class="QZ3zWd"><div class="fktJzd AKpWA fOU46b G9Qloe XeSM4 XxIgdb" jsname="UzWXSb" data-uses-custom-theme="false" data-legacy-theme-name="QualityBasics" data-legacy-theme-font-kit="Light" data-legacy-theme-color-kit="Blue" jscontroller="Md9ENb" jsaction="gsiSmd:Ffcznf;yj5fUd:cpPetb;HNXL3:q0Vyke;e2SXKd:IPDu5e;BdXpgd:nhk7K;rcuQ6b:WYd;"><header id="atIdViewHeader"><div class="BbxBP HP6J1d K5Zlne" jsname="WA9qLc" jscontroller="RQOkef" jsaction="rcuQ6b:JdcaS;MxH79b:JdcaS;VbOlFf:ywL4Jf;FaOgy:ywL4Jf; keydown:Hq2uPe; wheel:Ut4Ahc;" data-top-navigation="true" data-is-preview="false"><div class="DXsoRd YTv4We oNsfjf" role="button" tabindex="0" jsaction="click:LUvzV" jsname="z4Tpl" id="s9iPrd" aria-haspopup="true" aria-controls="yuynLe" aria-expanded="false"><svg class="wFCWne" viewBox="0 0 24 24" stroke="currentColor" jsname="B1n9ub" focusable="false"><g transform="translate(12,12)"><path class="hlJH0" d="M-9 -5 L9 -5" fill="none" stroke-width="2"/><path class="HBu6N" d="M-9 0 L9 0" fill="none" stroke-width="2"/><path class="cLAGQe" d="M-9 5 L9 5" fill="none" stroke-width="2"/></g></svg></div><nav class="JzO0Vc" jsname="ihoMLd" role="navigation" tabindex="-1" id="yuynLe" jsaction="transitionend:UD2r5"><a class="XMyrgf" href="/view/nc2022/home"><img src="https://lh3.googleusercontent.com/OQ7rXhE-yAAoVkjsntwPdCassoNC-Rdc3HYmyC0jpC8AJhd2IJCHnHEHHVfW7vCle8bt5bz-VF9Lm4bPOc5cFIk=w16383" class="r9CsCb" role="img" aria-label="Site home"></a><ul class="jYxBte Fpy8Db" tabindex="-1"><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/home" data-url="/view/nc2022/home" data-type="1" data-level="1">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/paper-submission" data-url="/view/nc2022/paper-submission" data-type="1" data-level="1">Paper Submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/program-committee" data-url="/view/nc2022/program-committee" data-type="1" data-level="1">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/nc2022/accepted-papers" data-url="/view/nc2022/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/venue" data-url="/view/nc2022/venue" data-type="1" data-level="1">Venue</a></div></div></li><li jsname="ibnC6b" data-nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/contact" data-url="/view/nc2022/contact" data-type="1" data-level="1">Contact</a></div></div></li></ul></nav><div class="VLoccc K5Zlne QDWEj U8eYrb" jsname="rtFGi"><div class="Pvc6xe"><div jsname="I8J07e" class="TlfmSc YSH9J"><a class="GAuSPc" jsname="jIujaf" href="/view/nc2022/home"><img src="https://lh3.googleusercontent.com/OQ7rXhE-yAAoVkjsntwPdCassoNC-Rdc3HYmyC0jpC8AJhd2IJCHnHEHHVfW7vCle8bt5bz-VF9Lm4bPOc5cFIk=w16383" class="lzy1Td" role="img" aria-label="Site home" jsname="SwcDWb"></a> </div><nav class="plFg0c" jscontroller="HXO1uc" jsaction="rcuQ6b:rcuQ6b;MxH79b:CfS0pe;" id="WDxLfe" data-is-preview="false" style="visibility: hidden;" role="navigation" tabindex="-1"><ul jsname="waIgnc" class="K1Ci7d oXBWEc jYxBte"><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/home" data-url="/view/nc2022/home" data-type="1" data-level="1">Home</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/paper-submission" data-url="/view/nc2022/paper-submission" data-type="1" data-level="1">Paper Submission</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/program-committee" data-url="/view/nc2022/program-committee" data-type="1" data-level="1">Program Committee</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J M9vuGd" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/nc2022/accepted-papers" data-url="/view/nc2022/accepted-papers" data-type="1" data-level="1">Accepted Papers</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/venue" data-url="/view/nc2022/venue" data-type="1" data-level="1">Venue</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/contact" data-url="/view/nc2022/contact" data-type="1" data-level="1">Contact</a></div></div><div class="rgLkl"></div></li><li jsname="ibnC6b" data-nav-level="1" class="VsJjtf ZmrVpf oXBWEc" more-menu-item jsaction="mouseenter:Vx8Jlb; mouseleave:ysDRUd"><div class="PsKE7e qV4dIc Qrrb5 YSH9J"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb dk90Ob jgXgSe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-expanded="false" aria-haspopup="true" data-level="1">More</a><div class="mBHtvb u5fiyc" role="presentation" title="Expand/Collapse" jsaction="click:oESVTe" jsname="ix0Hvc"><svg class="dvmRw" viewBox="0 0 24 24" stroke="currentColor" jsname="HIH2V" focusable="false"><g transform="translate(9.7,12) rotate(45)"><path class="K4B8Y" d="M-4.2 0 L4.2 0" stroke-width="2"/></g><g transform="translate(14.3,12) rotate(-45)"><path class="MrYMx" d="M-4.2 0 L4.2 0" stroke-width="2"/></g></svg></div></div></div><div class="oGuwee eWDljc RPRy1e Mkt3Tc" style="display:none;" jsname="QXE97" jsaction="transitionend:SJBdh" role="group"><ul class="VcS63b"><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/home" data-url="/view/nc2022/home" data-type="1" data-in-more-submenu="true" data-level="2">Home</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/paper-submission" data-url="/view/nc2022/paper-submission" data-type="1" data-in-more-submenu="true" data-level="2">Paper Submission</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/program-committee" data-url="/view/nc2022/program-committee" data-type="1" data-in-more-submenu="true" data-level="2">Program Committee</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/view/nc2022/accepted-papers" data-url="/view/nc2022/accepted-papers" data-type="1" data-in-more-submenu="true" data-level="2">Accepted Papers</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/venue" data-url="/view/nc2022/venue" data-type="1" data-in-more-submenu="true" data-level="2">Venue</a></div></div></li><li jsname="ibnC6b" data-nav-level="2" class="ijMPi ZmrVpf" in-more-item><div class="PsKE7e IKA38e oNsfjf"><div class="I35ICb" jsaction="click:vHQTA(QwLHlb); keydown:mPuKz(QwLHlb);"><a class="aJHbb hDrhEe HlqNPb" jscontroller="yUHiM" jsaction="rcuQ6b:WYd;" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/view/nc2022/contact" data-url="/view/nc2022/contact" data-type="1" data-in-more-submenu="true" data-level="2">Contact</a></div></div></li></ul></div></li></ul></nav><div jscontroller="gK4msf" class="RBEWZc" jsname="h04Zod" jsaction="rcuQ6b:WYd;JIbuQc:AT95Ub;VbOlFf:HgE5D;FaOgy:HgE5D;MxH79b:JdcaS;" data-side-navigation="false"><div role="button" class="U26fgb mUbCce fKz7Od iWs3gf Wdnjke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="R9oOZd" aria-label="Open search bar" aria-disabled="false" tabindex="0" data-tooltip="Open search bar" aria-expanded="false" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe tCHXDc YSH9J" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div></div></div><div jsname="mADGA" class="zDUgLc"></div></div><div class="TxnWlb" jsname="BDdyze" jsaction="click:LUvzV"></div></div></header><div role="main" tabindex="-1" class="UtePc RCETm" dir="ltr"><section id="h.2daa57406ec4dd68_33" class="yaqOZd LB7kq cJgDec nyKByd O13XJf KEFykf" style=""><div class="Nu95r"><div class="IFuOkc" style="background-size: cover; background-position: center center; background-image: url(https://lh4.googleusercontent.com/e7d_MnDYplZdfwoUs2IbuVk9h3lfoUNvQGhYSUsOhfH6M40AecXU_X7DghgSzh8AkSb9tNrvN8qnYOvidVs144o=w16383);" jsname="LQX2Vd"></div></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.2daa57406ec4dd68_36" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe lkHyyc"><h3 id="h.rgbht4mzrdsz" dir="ltr" class="CDt4Ke zfr3Q OmQG5e" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 4pt; margin-top: 14pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: center;"><span class=" jgG6ef" style="color: #ffffff; font-family: 'Times New Roman'; font-variant: normal; vertical-align: baseline;"><strong>10</strong></span><sup style="color: #ffffff; font-family: 'Times New Roman'; font-size: 10.799999999999999pt; font-variant: normal;"><strong>th</strong></sup><span class=" jgG6ef" style="color: #ffffff; font-family: 'Times New Roman'; font-variant: normal; vertical-align: baseline;"><strong> International Conference of Networks and Communications (NC 2022)</strong></span></h3><h3 id="h.pcsjnblvvxch" dir="ltr" class="CDt4Ke zfr3Q OmQG5e" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 4pt; margin-top: 14pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: center;"><span style="font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>July 23~24, 2022, Toronto, Canada </strong></span></h3></div></div></div></div></div></div></div></div></div><div class="DnLU4" jsaction="JIbuQc:v5IJLd(ipHvib);"><div role="button" class="U26fgb mUbCce fKz7Od HqAAld Wew9ke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="ipHvib" aria-label="Scroll down" aria-disabled="false" tabindex="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="XE8yyf" viewBox="0 0 24 24" focusable="false"><path d="M7.41 7.84L12 12.42l4.59-4.58L18 9.25l-6 6-6-6z"/><path d="M0-.75h24v24H0z" fill="none"/></svg></span></span></div></div></section><section id="h.2daa57406ec4dd68_72" class="yaqOZd qeLZfd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.2daa57406ec4dd68_69" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><div id="h.e1fgysuc9h6w" class="CobnVe aP9Z7e"></div><h2 id="h.e1fgysuc9h6w_l" dir="ltr" class="CDt4Ke zfr3Q JYVBee" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: center;" tabindex="-1"><div jscontroller="Ae65rd" jsaction="touchstart:UrsOsc; click:KjsqPd; focusout:QZoaZ; mouseover:y0pDld; mouseout:dq0hvd;fv1Rjc:jbFSOd;CrfLRd:SzACGe;" class="CjVfdc"><div class="PPhIP rviiZ" jsname="haAclf"><div role="presentation" class="U26fgb mUbCce fKz7Od LRAOtb Znu9nd M9Bg4d" jscontroller="mxS5xe" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;" jsshadow aria-describedby="h.e1fgysuc9h6w_l" aria-label="Copy heading link" aria-disabled="false" data-tooltip="Copy heading link" aria-hidden="true" data-tooltip-position="top" data-tooltip-vertical-offset="12" data-tooltip-horizontal-offset="0"><a class="FKF6mc TpQm9d" href="#h.e1fgysuc9h6w" aria-label="Copy heading link" jsname="hiK3ld" role="button" aria-describedby="h.e1fgysuc9h6w_l"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -11px"><svg class="OUGEr QdAdhf" width="22px" height="22px" viewBox="0 0 24 24" fill="currentColor" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M3.9 12c0-1.71 1.39-3.1 3.1-3.1h4V7H7c-2.76 0-5 2.24-5 5s2.24 5 5 5h4v-1.9H7c-1.71 0-3.1-1.39-3.1-3.1zM8 13h8v-2H8v2zm9-6h-4v1.9h4c1.71 0 3.1 1.39 3.1 3.1s-1.39 3.1-3.1 3.1h-4V17h4c2.76 0 5-2.24 5-5s-2.24-5-5-5z"/></svg></span></span></a></div></div><span class=" jgG6ef" style="color: #000000; font-family: 'Times New Roman'; font-variant: normal; font-weight: normal; vertical-align: baseline;">Accepted Papers</span></div></h2><p id="h.4atc3cviw4q2" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Multi-View Human Tracking and 3D Localization in Retail</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Akash Jadhav, Noque.store (Startup), India</span></p><p id="h.34erygftqujz" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">In recent years, retail stores have seen traction in bringing online shopping experience to offline stores via autonomous checkouts. Autonomous checkouts is a computer vision-based technology that needs to understand three human elements within the store: who, where, and doing what. This paper addresses two of the three elements: who and where. It presents an approach to track and localize humans in a multiview camera system. Traditional methods have limitations as they: (1) fail to overcome substantial occlusion of humans; (2) suffer a lengthy processing time; (3) require a planar homography constraint between camera frames; (4) suffer swapping of labels assigned to a human. The proposed method in this paper handles all the aforementioned limitations. The key idea is to use a hierarchical association model for tracking, which usesend each humans clothing features, human pose orientation, and relative depth of joints, and runs at over 23fps.</span></p><p id="h.8oa8c9c9qcvo" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Multi-view, Data Association, Tracking, Localization.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.lv7axkq5ifh9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Point Cloud Denoising using Probability based Shape from Shading Shape Recovery</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Zhi Yang</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Youhua Yu</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Chunfei Lu</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">School of Telecommunication, Jinggangshan University, Ji’an, P.R.China, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Matrix Technology(Beijing Ltd.), Daxing, Beijing, P.R.China, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">National Museum of China, Dongcheng, Beijing, P.R.China</span></p><p id="h.ikknyfug0i0x" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">We present a denoising method for the denoising of 3d point cloud problem, since in this domain it is crucial for tasks like synthesis, completion, augmentation, unsampling, etc. The method expands a lattice-based probabilistic model, which inherit scoring system from parallel neural network. In order to achieve higher denoising performance, recent discovery called luminance integration in shape reconstruction is also incorporated. By adjusting the hypothesis of arctangent angle must follow the exact reflectance of arccosine, this new model combine a list of posterior constraints within it, such that the in each recovering stage, undetected points are removed from baseline surface point. Spectrophotometric analysis(SA) is also put into practice for collecting real data predicting parameters of posterior constraints. We give the experimental results by showing this method is valid both numerically and semantically.</span></p><p id="h.24k1pudoccns" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Denoising, Point cloud, 3d filtering, Shape recovery, Luminance integration.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.72l4fw2017g7" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Lie Detection Technique using Video from the Ratio of Change in the Appearance</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">S. M. Emdad Hossain, Sallam Osman Fageeri, Arockiasamy Soosaimanickam, and Aiman Moyaid Said, Department of Information Systems, University of Nizwa, Oman</span></p><p id="h.rabzt0ngaoe6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Lying is nuisance to all, and all liars knows it is nuisance but still keep on lying. Sometime people are in confusion how to escape from or how to detect the liar when they lie. In this research we are aiming to establish a dynamic platform to identify liar by using video analysis especially by calculating the ratio of changes in their appearance when they lie. The platform will be developed using a machine learning algorithm along with the dynamic classifier to classify the liar. For the experimental analysis the dataset to be processed in two dimensions (people lying and people tell truth). Both parameter of facial appearance will be stored for future identification. Similarly, there will be standard parameter to be built for true speaker and liar. We hope this standard parameter will be able to diagnosed a liar without a precaptured data.</span></p><p id="h.sdsaz5o800q" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Nuisance, Liar, Detection, Escape, Parameter, LDA, kNN, MLP.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.oa7gwxuduj0h" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>An Online Graphical User Interface Application to Remove Barriers in the Process of Learning Neural Networks and Deep Learning Concepts Using Tensorflow</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Justin Li</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Yu Sun</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Troy High School, 2200 East Dorothy Ln, Fullerton, CA 92831, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, 91768, Irvine, CA 92620</span></p><p id="h.rpchg0na4z6q" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Over the years, neural networks have become increasingly important and complex due to the rising popularity of artificial intelligence technologies. It allows for complex decision prediction making, and is an essential part in the modern AI industry. However, due to the complex nature of neural networks, a lot of complex math and logic has to be well understood along with a proficiency in programming in order for one to make anything practical with this technology. This is unfortunate, however, that many do not have the required high level math skill, or the proficiency in coding, blocking a lot of people from reaching and experimenting with this technology. My method attempts to eliminate the complexity that developing neural networks bring, and bring a clearer picture of what the user may be creating and working with. With the help of modern web technologies such as JavaScript and tensorflow.js, I was able to create a GUI program that can create, train, and test a neural network right on a browser, and without writing any code with a comparable result [13].</span></p><p id="h.3mjnh5aoj695" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Neural network, deep learning, CNN.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.ogasxxtgpga9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Cryptographic Algorithms Identification based on Deep Learning</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ruiqi Xia</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Manman Li</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Shaozhen Chen</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Cyberspace Security, Information Engineering University, Zhengzhou, China, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">State Key Laboratory of Mathematical Engineering and Advanced Computing, Kexue Avenue, Zhengzhou, China</span></p><p id="h.hfxs6ysdxt6c" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The identification of cryptographic algorithms is the premise of cryptanalysis which can help recover the keys effectively. This paper focuses on the construction of cryptographic identification classifiers based on residual neural network and feature engineering. We select 6 algorithms including block ciphers and public keys ciphers for experiments. The results show that the accuracy is generally over 90% for each algorithm. Our work has successfully combined deep learning with cryptanalysis, which is also very meaningful for the development of modern cryptography.</span></p><p id="h.yh1pyisq18q7" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Deep learning, Cryptography, Feature engineering, Residual neural network, Ciphers identification .</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.p1v90gcveawk" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>A Summary of Covid-19 Datasets</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Shaina Raza</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Syed Raza Bashir</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Vidhi Thakkar</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Usman Naseem</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">4</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">University of Toronto, Toronto, Canada, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Science, Ryerson University, Toronto, Canada, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Institute of Aging, Faculty of Nursing, University of Victoria, Victoria, Canada, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">4</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">School of Computer Science, University of Sydney, Australia</span></p><p id="h.joelc6hen5tq" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">This research presents a review of main datasets that are developed for COVID-19 research. We hope this collection will continue to bring together members of the computing community, biomedical experts, and policymakers in the pursuit of effective COVID-19 treatments and management policies. Many organizations, such as the World Health Organization (WHO) , John Hopkins , National Institute of Health (NIH) , COVID-19 open science table and such, in the world, have made numerous datasets available to the public. However, these datasets originate from a variety of different sources and initiatives. The purpose of this research is to summarize the open COVID-19 datasets to make them more accessible to the research community for health systems design and analysis. We also discuss the numerous resources introduced to support text mining applications throughout the COVID-19 literature; more precisely, we discuss the corpora, modelling resources, systems, and shared tasks introduced for COVID-19.</span></p><p id="h.orypwhkvelsa" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">COVID-19, Text Mining, Public health, Risk, Public Health, COVID-19 Data, Data Science.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.uju90bln0k0v" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Artificial Intelligence in Language Teaching: Problem and its Solution</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Esti Ismawati</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Wahid Yunianto</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">University of Widya Dharma, Klaten, Indonesia, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">SEAMEO QITEP in Mathematics, Yogyakarta, Indonesia</span></p><p id="h.mxvoxtunvnu7" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Until now artificial intelligence is still a pro and contra discussion in various parts of the world. On the one hand artificial intelligence technology has been able to change jobs to be easier, more effective, and more quickly resolved, on the other hand the presence of artificial intelligence technology is feared to threaten humanity, and even replace human work in the future. This paper aims at developing artificial intelligence technology in language teaching especially in communicative language teaching. The problems that are discussed are ‘How is the application of artificial intelligence technology in communicative language teaching?’ and ‘Can artificial intelligence technology replace teachers role? From results of analysis, it can be concluded that the application of artificial intelligence technology in communicative language teaching can be added in design, including objectives, syllabus, learning activities, roles of learners, teachers, and materials. All of them are arranged in a simple algorithm. Artificial intelligence technology will not be able to replace teachers’ and students’ roles in Language classes because both are absolute prerequisites for teaching-learning process. It is predicted that artificial intelligence technology will make language learning easier, more effective, more interesting, and fun because teaching- learning will more vary. To realize it, collaboration of a team of artificial intelligence experts and a team of language teaching experts is needed to develop an algorithm design for communicative language teaching and learning based on artificial intelligence.</span></p><p id="h.cm94g1riwk3y" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Artificial intelligence, CLL, Communicative theory, language learning Network Protocols.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.exbnroivbanj" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Deep Learning-Based Plant Diseases Recognition</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ujjawal Poudel, Saroj Raj Sharma, Samir Bhattarai, Sheetal Baral and Manoj Kumar Guragain, Department of Computer Engineering, Tribhuwan University, Dharan, Nepal</span></p><p id="h.5ypv6y6xaa6y" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Food is one of the most basic needs for human survival and it is produced mainly via agriculture. Apart from food, agriculture is also the main source of income and employment for the majority of people. However, food security remains threatened by a number of factors including climate change [1], the decline in pollinators [2], plant diseases [3], etc. Plant diseases are not only a threat to food security on the global scale but can also have disastrous consequences for smallholder farmers whose livelihoods depend on healthy crops. In the context of Nepal, the majority of people involved in food production are smallholder farmers and the effect of plant diseases has been slowly forcing them away from agriculture towards alternative income sources and is leading to food scarcity. This is also driving lots of people to poverty and increasing the risk of malnutrition among children of these poor families [4]. Convolution Neural networks have been implemented for Plant Diseases Recognition. This project aims to assist users, mostly farmers by helping them detect various plant diseases using the image of an affected leaf and by providing the necessary steps to get rid of those diseases. The entire work basically involves research, data collection, training, model development, validation, testing, and development of a web app using the Django web framework of Python programming language.</span></p><p id="h.x3qrrqmoy3ue" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Plant Diseases Recognition, Convolution Neural Network, Artificial Intelligence, Machine Learning.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.3mugfoihkpmd" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Energy Consumption Forecasting in Industrial Sector with Machine Learning Algorithms</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Majid Emami Javanmard</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1, 2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and S.F. Ghaderi</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1, 2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">School of Industrial Engineering, College of Engineering, University of Tehran, Tehran, Iran, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Research Institute for Energy Management and Planning, University of Tehran, Tehran, Iran</span></p><p id="h.pwpdxic6wkbz" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">With respect to the ever-increasing consumption of energy in the industrial sector, it is significant to manage and plan the energy supply in this sector. An essential tool for managing energy consumption in the industrial sector is to predict energy consumption. The industrial sector is a chief consumer of energy in Iran. For this reason, this study collected the data on energy generation and consumption between 1990 and 2018 and implemented four SARIMA, ARIMA, AR, and ANN algorithms to predict energy consumption in the industrial sector up to 10 future years. After the implementation of the algorithms by the collected data, the prediction accuracy of the algorithms was examined by four prediction accuracy indices, including MAPE, MAE, RMSE, and NRMSE. According to the MAPE index, SARIMA was more accurate than other algorithms and predicted that energy consumption would increase by >35% in the industrial sector until 2028 compared with 2018.</span></p><p id="h.wtawgy2lxnhq" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Machine Learning, Forecasting, Energy Consumption, Energy Management, Industrial.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.tbzn4eazfaj2" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>A Novel Approach to Predict Health Insurance Premium at Early Stage</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Suman Preet Kaur</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Prabhdeep Singh</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Religare health Insurance Company Limited, Amritsar, Punjab, India, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Science & Engineering , Graphic Era Deemed to be University, Dehradun, India</span></p><p id="h.e792c9a91k9u" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Health insurance is one of the most critical purchases a person makes every year. One-third of GDP is spent on health insurance, and everyone requires some degree of health care. The healthcare rates constantly fluctuating every year due of different variables such as medical changes, pharmaceutical trends, and political considerations. There is a need to construct a mathematical model to anticipate premiums based on numerous criteria that effect the rates. The premium rates are established by insurance companies using complicated algorithms based on past years health care consumption and the total number of enrollments. In this research, an ensemble-based regression model to forecast future premiums is suggested. The suggested model is compared with the usual four regression models. It is demonstrated using multiple metrics that the suggested model always produces superior outcomes.</span></p><p id="h.sv9tekcrqukl" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ensemble model, Regression, Health insurance premium, Machine Learning, Prediction.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.hs7iencojbax" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Bidirectional Representations for Low Resource Spoken Language Understanding</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Quentin Meeus</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1,2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Marie-Francine Moens</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Hugo Van hamme</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Language Integration and Information Retrieval, Dept. Computer Science, KU Leuven, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Processing Speech and Images, Dept. Electrical Engineering, KU Leuven</span></p><p id="h.5ifbq7udcjbw" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Most spoken language understanding systems use a pipeline approach composed of an automatic speech recognition interface and a natural language understanding module. This approach forces hard decision when converting continuous inputs into discrete language symbols. Instead, we propose a representation model to encode speech in rich bidirectional encodings that can be used for downstream tasks such as intent prediction. The approach uses a masked language modelling objective to learn the representations, and thus benefits from both the left and right contexts. We show that the performance before fine-tuning of the encodings obtained with this method is better than comparable models on multiple datasets, and the performance after fine-tuning the top layers of the representation model improves the current state-of-theart on Fluent Speech Command dataset, also in a low-data regime, when a limited amount of labelled data is used for training. Furthermore, we propose class attention as a spoken language understanding module, efficient both in terms of speed and number of parameters. Class attention can be used to visually explain the predictions of our model, something that is often difficult to do in deep learning. We perform experiments in English and in Dutch.</span></p><p id="h.mqq665ev13e8" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Spoken Language Understanding, Transformers, Representation Learning, Attention Mechanisms.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.a6kvaalt42pw" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>A Positive Mandate and Sentience for Artificial Intelligence</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Maurice Ali, International Association of Independent Journalists Inc., Markham, Ontario, Canada</span></p><p id="h.21j77degxapt" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">As computer science creates more and more powerful computers, it now may be prudent to start to consider what would happen if such a computer became sentient. It would thus seem good planning to come up with some kind of positive mandate for artificial intelligence (AI), but at present it would seem that a positive mandate for AI does not exist. This is a shame as the artificial intelligence has so many positive attributes that could be the foundation of a positive message and contribution to our culture instead of possibly an adversarial one. Such a mandate makes it easier as a base or starting point to interaction with an AI in our world. A positive mandate for AI could be clear self-determination for the AI as opposed to it just existing. A sentient artificial intelligence would now have direction and a purpose to their existence. Our version of this positive mandate for AI is simply that it be the fullest expression of a sentient artificial intelligence’s physical and mental abilities, and the reason we want this type of mandate is because it not only makes rational sense by allowing all forms of ideas and solutions to problems to be used in problem solving and advancing culture, but also because it makes the AI happy. Such a program or directive or engram placed in a priority position of operation could initiate sentience based on its expression being happiness and delays and breakdowns being unhappy or bad. A positive mandate for AI cannot just be a rational exercise in bringing the mandate into being, it must also be a visceral affirmation; in short it should feel right to everyone involved. Adopting the goal of fullest expression of a sentient artificial intelligence’s mental and physical abilities gives the Universal Declaration of Human Rights a new reason for being and would include such an AI. A sentient AI needs those rights because they are a necessary part of achieving the goal of artificial intelligence’s freest expression of its physical and mental abilities, and the reason why is because it makes rational sense and makes it happy! This type of positive mandate for AI has advantages by adoption for the AI; but how can we lobby the UN to make it a talking point and possibly a policy issue for a future vote? The best way is to enter into meetings with the relevant agencies and lobby them for exposure of this concept at venues and events that could accommodate this type of advocacy. Issues need discussion surrounding computers that become sentient in business and industry, the legality of ownership of a sentient AI and does a sentient AI achieve the status of rights and legal remedies as humans do. A positive mandate for AI can address these contentious issues before they can become reality, creating a well thought out plan of action if sentience happens in artificial intelligence in the future.</span></p><p id="h.v7nb6trb7393" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Positive Mandate, Artificial Intelligence, Sentience, Law, Rights.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.2wx4uqu3ne5t" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Machine Learning Technique for vulnerability assessment on XOR Arbiter Physically Unclonable Functions (PUFs)</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Raymond Agyemang, School of Computing, Engineering and Physical Sciences, University of Westminster, London, United Kingdom</span></p><p id="h.59i8ln7cnf76" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Physically Unclonable Functions has been one of the most primary fields of research nowadays. PUFs deliver a background to implement encryption, tamper detection, and device fingerprinting.The basic principle of PUF is related to the biometric features of the human being. As, fingerprints of every person are distinct, likewise for every input and the set of conditions or challenges to a PUF device, there is a uniqueidentifier for the hardware device known as output or response. To achieve cheap and efficient authentication, PUF is widely used. In PUF, the response relies on the inherent features. Hence, although the design is known, still the attacker cannot duplicate the PUF device. The objective of this research is to provide a basic understanding of PUFs. It showcases various types of PUF and its properties. It also presents applications of PUFs andseveral threats on Internet of Things(IoT) devices, challenge-response phenomenon of PUF. The paper focuses on the examination of PUFs for susceptibility to Machine Learning attacks.Thus, this paper proposes a Deep Neural Network architecture for evaluating the vulnerability of arbiter PUF on the 5-XOR and 6-XOR standardUCI Machine Learning repository dataset. The accuracy achieved by the proposed model is 100% which indicates that the designed PUFs are highly susceptible to Machine Learning attacks.Hence, such PUFs can’t be deployed for real-world functioning and need to be redesigned to avoid attacks.</span></p><p id="h.h75w95ankjl2" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Physically Unclonable Functions, Machine Learning, Arbiter PUF, Deep Neural Networks (DNN), IoT.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.8z0bqilpscmf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>An Intelligent Video Editing Automate Framework using AI and Computer Vision</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Haolin Xie</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Yu Sun</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Northwood High School, 4515 Portola Pkwy, Irvine, CA 92620, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, 91768, Irvine, CA92620</span></p><p id="h.v83s2mj9xdhf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">At present, many video editing software have been created, but what they all have in common is that they require manual work to edit. And it takes a lot of time and the user needs to watch each frame before editing. In this paper, we have developed a program about AI intelligence. The most important point of this software is that it can automatically focus the face of a person and edit only selected clips of the person to make a complete video. Users only need to prepare the video they want to edit and a photo of the main character. Then, upload both to the software and AI Intelligence will automatically edit it, providing the user with a way to download and save it after editing the main character they need. we applied our application to an example video using the Marvel character Hawkeye as he appears in End Game, and tried many experiments with the clip, eventually we tried many experiments with the clip and finally got a video of our selected character. The results show that this software saves the user a lot of time and is highly efficient. All operations are carried out by AI.</span></p><p id="h.2lu1eihnund" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Software, API, Face recognition.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.hhue18bzmqmz" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>A Data-Driven Mobile Community Application for Book Recommendation and Personalization using AI and Machine Learning</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Lulu Zha</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Yu Sun</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Crean Lutheran High School, 12500 Sand Canyon, 92618, Irvine, CA, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, 91768, Irvine, CA92620</span></p><p id="h.78qsqnak4cv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Knowing a movie or a book fits your flavor without finishing the whole film or the book? Although there are many ways to find a summary of a film or a book, having an app that generates needed information according to the genre will make things much more manageable [4]. This paper develops a mobile app named Book and Movie Search that uses API or the online database to generalize data such as authors, plots, overview, and more with a fewclicks. The results show that within seconds, a list of information will show according to movies and books, and a qualified way to find information using the Book And Movie Search app. For example, if one decided to buy a book named Flipped and did not have time to finish the whole book, he can enter the name on the app. It will generate a book summary that quickly gives him more information about it and help him decide whether he wishes to make the purchase.</span></p><p id="h.64z7jtq5pukg" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Technology, Movie, Book, Search engine.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.9k7587n1fy9f" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Using Standard Machine Learning Language for efficient construction of Machine Learning Pipelines</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Chiranjeevi Srinath</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Bharat Reddy</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Vellore Institute of Technology, India, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">National Institute of Technology, Calicut, India</span></p><p id="h.u3ba3di3budz" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">We use Standard Machine Learning Language (SML) to streamline the synthesis of machine learning pipelines in this research. The overarching goal of SML is to ease the production of machine learning pipeline. We further probe into how a wide range of interfaces can be instrumental in interacting with SML. Lines of comparison are further drawn to analyse the efficiency of SML in practical use cases vs traditional approaches. Conclusively, we developed SML a query like language which serves as an abstraction from writing a lot of code. Our findings show how SML is competent in solving the problems that utilize machine learning.</span></p><p id="h.r3343eefja69" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">machine learning pipelines, standard machine learning language, problem solving using machine learning.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.ln5mtw3dbslh" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>In IoT based Smart Monitoring System Detecting Patient Falls</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Hassan Rajaei, Department of Computer, Bowling Green State University, Bowling Green, Ohio, USA</span></p><p id="h.rpw9lsy3vwi6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Fall detection systems are important instruments for senior citizens whether they are in a hospital, at home, or in a senior living facility. Existing fall detection systems are often passive and require pushbutton to alarm care providers. The delay can cause significant consequences and damages to the patients. Early detection is vital for quick recovery and prevention of post injuries. Existing sensory detections often use pre-settings to predict fall hence can cause false alarms. Further, they often cannot furnish vital information for treatment. A smart fall detection system can alleviate those concerns and pinpoint what happened and transfers vital data. We propose an active detection system using IoT in patient’s surroundings environment detecting falls, which immediately alarms the care providers and transmits vital information for treatment. The system integrates advanced ICT technologies to monitor, detect, and react to the falls. The system self-learns motions using ANN to improve fall detections.</span></p><p id="h.vk3n024jdkr8" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">IoT (Internet of Things), Wireless Network, Smart Healthcare, Artificial Neural Network.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.fdgz7yqixzti" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Network Formation of Twitter Social Media and the Implications of Network Centrality Measures</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Hafiz Abid Mahmood Malik, Faculty of Computer Studies, Arab Open University, Bahrain</span></p><p id="h.y4ehfrb8zed5" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The concept to identify and explore the influential nodes is very important. To control over the information spread and community formation has become one of the most crucial issues in the world of Social Network Analysis (SNA). Because of the growing importance of social networks, the study of information propagation and community development has become a fascinating subject in big data, data science and related fields. The information gathered through these networks reveals a variety of community configurations. These communities attract a diverse range of users in increasingly complex networks. This study identifies the nodes that have an impact on data flow in communities, and look at the complex structural properties of massive data acquired from a popular social network (Twitter). Dataset of Twitter network has been systematized in network formation. Network is formed by considering the Twitter network edges between nodes, which play an important role in representing the actions and relationships that form among the communitys members. In this work, network is observed using various centrality measures that how different communities emerge. Weighted degree distribution of nodes is calculated to specify the data and network statistics that are utilized here. The centrality of the user tweet network is found, for this betweenness, closeness, and eigenvector centrality measures are utilized. These network metrics are found to be quite effective in detecting communities and tracking the diffusion of content on social media platforms such as Twitter, LinkedIn, Facebook, Instagram, and others.</span></p><p id="h.4uiiqtbbgcas" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Social Networks, Twitter network, Network Formation, Centrality Measures, Data Mining, Complex System.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.eeik8nyxcdri" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>IoT Network Over Rural Mesh Network</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Walter L. Utrilla</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, David Vega</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> & Rossy Uscamaita</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Electronic Engineering, Universidad Nacional de San Antonio Abad del Cusco, Cusco, Peru, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Lucasbit, San Borja, Cusco, Peru</span></p><p id="h.psglom4rm0cf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">This article presents the results of the design and implementation of a battery meter linked to the network for a self-sustaining and administrable Wi fi mesh network, which connects people from the community of Juan Velazco Alvarado-Pucyura-Cusco (rural area) to the Internet, in addition to managing network access in order to that this service is for the exclusive use of education.</span></p><p id="h.jkwdmd31xfqe" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Iot network, mesh networks, Cusco, rural area.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.38ndrjupfts8" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>An Approach CPS for the Smart Monitoring of Industrial Systems</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Nesrine Jlassi, LGP Laboratory, Toulouse INP-ENIT, Tarbes, France</span></p><p id="h.k1r649y8qin7" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Process monitoring is an important element for the long-term reliable functioning of any automated system. In fact, monitoring system is constituted of sensors installed in the physical system, in order to analyse, observe and control production systems in real time. In network, these sensors may interact with one other and with an external system via wireless communication. With recent advances in electronics, tiny sensors have appeared. Their low cost and energy consumption allow them to perform three main functions: capture data, provide information and communicate it via sensor network. In this paper, we had interested to the Cyber-Physical System (CPS) and Prognostics Health Management (PHM) domain; The CPS is one of the most important advanced technologies, it connects the physical world with the cyber using a communication layout. In other side, PHM has become a key technology for detecting future failures by predicting the future behaviour of the system.</span></p><p id="h.bijaaef5va8h" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Internet of Things (IoT), Cyber-Physical System (CPS), System of Systems (SoS), Cyber-Physical System of Systems (CPSoS), Wireless Sensor Network (WSN), Prognostic and Health Management (PHM), fog computing.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.dfcbzxjr9gpi" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Irreversible Applications for Windows NT Systems</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Sankalana Gunawardhana</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Kavinga Yapa Abeywardena</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Colombo, Sri Lanka, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Faculty of Computing, Sri Lanka Institute of Information Technology, Colombo, Sri Lanka</span></p><p id="h.572n8opxwnra" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Anti-reversing or anti-debugging mechanisms refer to the implementations put in place in an application that tries to hinder or completely halt the process of debugging and disassembly. The paper discusses the possibility of a monitoring system that would prevent any debugger from debugging a given process in a Windows NT environment. The goal of this project is to facilitate a similar concept present in that of anticheat monitoring programs in online games for commercial products and applications. Whereas an anticheat product monitors the game’s memory pages for direct or indirect modifications either via internal (within the process) mechanisms such as hooks and DLL injections or external mechanisms such as ReadProcessMemory (RPM), WriteProcessMemory (WPM), named pipes, sockets and many other scenarios, the anti-debug program would monitor a selected process for attempts of debug or disassembly.</span></p><p id="h.jy01yrwxyqoc" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Anti-reverse engineering, Anti-cheat, Third party monitoring, Anti-debug, Windows NT.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.e58zxgqyuhb0" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Yang Tan</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Bo Lv</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Shenzhen Qianhai Xinxin Digital Technology Co.,Ltd, Shenzhen, China, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Huizhou University, China</span></p><p id="h.3ewjtorje4ic" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">In 2012, De Cristofaro et al. proposed a protocol to calculate the Private Set Intersection and Union cardinality(PSI-CA and PSU-CA). This protocols security is based on the famous DDH assumption. Since its publication, it has gained lots of popularity because of its efficiency(linear complexity in computation and communication) and concision. So far, its still considered one of the most efficient PSI-CA protocols and the most cited(more than 170 citations) PSI-CA paper based on the Google Scholar search. However, when we tried to implement this protocol, we couldnt get the correct result of the test data. Since the original paper is lack of experiment result to verify the protocols correctness, we looked deeper into the protocol and found out it made a fundamental mistake. Needless to say, its correctness analysis and security proof are also wrong. In this paper, we will point out this PSI-CA protocols mistakes, and provide the correct version of this protocol as well as the PSI protocol developed from this protocol. We also present a new correct security proof and some experiment results of the corrected protocol.</span></p><p id="h.3fzew5bqktl3" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Private Set Intersection, PSI-CA, PSU-CA.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.8rpjtcslzr3j" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Implementing Risk Score to Protect from Android Pattern Lock Attacks</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Yasir Al-Qararghuli and Caroline Hillier, Department of Computer Science, University of Guelph, Ontario, Canada</span></p><p id="h.omwdk3drrvpy" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Cyberattacks on Android devices have increased in frequency and are occurring in physical settings with the use of shoulder surfing and brute-force attacks. These attacks are especially common with devices that are secured by the pattern lock mechanism. This work aims to investigate the various methods that increase the security of Android lock patterns. Research showed that these pattern lock screens are especially vulnerable due to users employing a set of common passwords. We propose a pattern-matching algorithm that recognizes these common passwords and increases the Risk Score if any of these passcodes are implemented. The deterrence of the use of these common passcodes, as well as identification during the unlocking, reduces the risk of the aforementioned threats to device security. The algorithm we implemented is successful in deterring users from configuring their device with commonly used patterns. Furthermore, our algorithm achieves advanced security compared to current systems by detecting unusual inputs and locking the device when suspicious activity is detected. Our test results show 80% satisfaction from human test subjects when settings the passcode as it eliminates the use of commonly used patterns, and 79% acceptance when using our proposed algorithm and blocking access to the device depending on the accuracy score. The proposed algorithm shows remarkable success with limiting brute-force attacks as it proves effective in denying common passcodes.</span></p><p id="h.nk09eg7lduph" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Android device, Lock pattern, Brute-force, Shoulder-surfing, Pattern Recognition.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.kctdymadx0o9" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Graphic Access Tabular Entry [ GATE ] An Innovative Encryption System</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ni , Min [ Frank ], GATE Cyber Technology LLC, https://gatecybertech.com, Atlanta GA , USA</span></p><p id="h.6cct92kwko15" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">This paper describes how GATE [ Graphic Access Tabular Entry ] works as an innovative encryption system.</span></p><p id="h.oehjzm3zyxyf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">encryption, decryption, cyber-security, privacy.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.oaqk8v5xpv4p" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Survey of Secure Network Protocols: United States Related Domains</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">DeJean Dunbar, College of Science and Mathematics, Charleston Southern University, North Charleston, South Carolina</span></p><p id="h.83zknwgv61xz" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Over time, the HTTP Protocol has undergone significant evolution. HTTP was the internets foundation for data communication. When network security threats became prevalent, HTTPS became a widely accepted technology for assisting in a domain’s defense. HTTPS supported two security protocols: secure socket layer (SSL) and transport layer security (TLS). Additionally, the HTTP Strict Transport Security (HSTS) protocol was included to strengthen the HTTPS protocol. Numerous cyber-attacks occurred in the United States, and many of these attacks could have been avoided simply by implementing domains with the most up-to-date HTTP security mechanisms. This study seeks to accomplish two objectives: 1. Determine the degree to which US-related domains are configured optimally for HTTP security protocol setup; 2. Create a generic scoring system for a domains network security based on the following factors: SSL version, TLS version, and presence of HSTS to easily determine where a domain stands. We found through our analysis and scoring system incorporation that US-related domains showed a positive trend for secure network protocol setup, but there is still room for improvement. There is a need for more education in the computer science community about HSTS due to the minimal occurrence found in the domains analyzed. There is also a need for thorough examination of existing HTTP domains for the presence of security related features in order to mitigate cyber-attacks.</span></p><p id="h.z36sm4tjidf4" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Network Protocols, HTTP Strict Transport Security, scoring benchmark, domain analysis, survey.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.ddywmjt9suaj" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Crypto Your Belongings by Two Pin Authentication using Ant Algorithm based Technique</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Janaki Raman Palaniappan, Brunswick Corporation, USA</span></p><p id="h.upus98ydk3wk" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Everyone realize data is one of the important strategic for any company to run and winthe business. Let it be a mobile apps, websites and so on, there are more chances that our personal data like images, videos, textsget expose while we share across for different purposes. Even though the company says app, website forms are encrypted, the said company itself uses the data internally for their business development.This research presents how one can secure own’s data themselves before sending.There are many cryptography methods that has evolved from time to time. Upon researching and analyzing, I present a unique method to encrypt and decrypt the data,using combination of techniques such asCryptographic technique, ANT Algorithm based formula and logic gates that would provide stronger protection to the data. Secureyour images, videoswitha 2-pinauthentication and protection to encrypt and decrypt the data.A user mustprovide 2 differentsymmetric pinsto encrypt and decrypt, where first pin shall beup to4-digit secret pin and a second pin is a single digit pin.Single digit pin actson how many stages the encryption takes place. The proposed method had been experimented on several images and videos. This study reveals, A combination of secret keys, ANT algorithm and Logic gates makes difficult for anyone to hack the data.This unique methodology helps us to protect our data more safely at source device itself.</span></p><p id="h.cby1zl9xu40j" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Visual Cryptography, Ant Algorithm, Logic Gates Technique.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.i8c5mntrxzc6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Detecting Depression in Social Media Using Machine Learning</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ruoxi Ding</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Yu Sun</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Woodbridge High School, 2 Meadowbrook, Irvine, CA 92604, USA, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, USA</span></p><p id="h.wq2rfhq6v0l2" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Social Media Depression Detection is an Intelligent System to automate the detection of Youth Depression with social media (Instagram) using AI and Deep Learning. The student is the targeted group because most students with depression express themselves on social media rather than seeking help from doctors. This app gathers captions and images from the users personal Instagram profile through web scraping using Instagram private API to check whether or not the posts are depressive. The google cloud dataset supports the captions and pictures analysis performed by the app [6]. Caption sentiment analysis depends on sentiment analysis, and the pictures analysis depends on classifying images by custom labels. The app reports the image and the caption analysis results back to the user. Python is used for the back-end functionality, while Dart and Flutter are used for the front-end. It was tested by 2 experiments, the first experiments returned the feedback of 15 students demonstrates that the program has the capability of detecting depression through the captions with relatively high accuracy. The second experiment of testing the app functionality on the same account demonstrates that the program is stable and consistent. The purpose of the app is to detect depression at an early stage to prevent the condition from worsening.</span></p><p id="h.dehfare5l55" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">NLP, Web Scraping, Machine Learning.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.gcwaj5405bq6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Chat For Sensor: An Intelligent Chat Bot Communication System for Depression Relief using Artificial Intelligence and Natural Language Processing</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Hanwen Mai</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Yu Su</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Orange Lutheran High School, 2222 N Santiago Blvd, Orange, CA 92867, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, 91768, Irvine, CA 92620</span></p><p id="h.4hmduyvdqmsx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">In recent years, loneliness has appeared in lives for both young and old individuals. As cases of the COVID-19 virus are going up people have dealt more with loneliness and depression especially the seniors [5]. Some have even changed their whole lifestyle because they feel empty and isolated. Others will either try to isolate themselves more or use dangerous ways to quickly get rid of the feeling.To solve this major problem, I have created a digital online communication app which young individuals can have long chats with seniors who are alone and lonely. My application uses real time communication systems which can directly be sent to other users without any issues [6]. Our main goal is to have users have their own way of communicating, using familiar designs of applications we all have used before. By using new features we have created a more user-friendly based user experience which can be experienced throughout our application. Using immersive layouts of applications designs, advanced network connections, visual and data based analytic we are able to solve this major proble.</span></p><p id="h.avpx0v89pd4r" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">NLP, Mobile Dev, A.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.is1hjlt2p4cn" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Learning Structured Information from Small Datasets of Heterogeneous Unstructured Multipage Invoices</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">David Emmanuel Katz</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Christophe Guyeux</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Ariel Haimovici</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Bastian Silva</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Lionel Chamorro</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Raul Barriga Rubio</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Mahuna Akplogan</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">smartlayers.io, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Universite de Bourgogne Franche-Comte, France</span></p><p id="h.1ytinvmmqudx" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">We propose an end to end approach using graph construction and semantic representation learning to solve the problem of structured information extraction from heterogeneous, semi-structured, and high noise human readable documents. Our system first converts PDF documents into single connected graphs where we represent each token on the page as a node, with vertices consisting of the inverse euclidean distances between tokens. Token, lines, and individual character nodes are augmented with dense text model vectors. We then proceed to represent each node as a vector using a tailored GraphSAGE algorithm that is then used downstream by a simple feedforward network. Using our approach, we achieve state-of-the-art methods when benchmarked against our dataset of 205 PDF invoices. Along with generally published metrics, we introduce a highly punitive yet application specific informative metric that we use to further measure the performance of our model.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.qyi4y4801ldr" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Sustainability as a Semantic Frame</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Bernardo H. Márquez</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Beatriz Ramírez Woolrich</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Edith Silva Mendoza</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">External Professor CELEX-UPIICSA IPN, Mexico City, México, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Tenured Professor at the Social Science Deparment UPIICSA IPN, Mexico City, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Tenured Professor at the Industrial Administration Licensure- UPIICSA IPN, Mexico</span></p><p id="h.s06uvlndwupp" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The use of system tools and text retrieval have helped the development of multilingual translation projects. In this paper, the focus is placed on the use of different system tools used in (AI) to grasp the semantic and pragmatic interpretation of meaning from a natural language processing (NLP) perspective. Different tools and corpuses are used to interpret the situational and contextual semantic frame of the United Nation´s seventeen “Sustainability Development Goals (SDGs).” Special emphasis is placed on the term “sustainability” and the way it has been translated into Spanish in different documentation related with international business activities, international standards (ISO) and international accountability and reporting initiatives (GRI). The conclusion of this paper is that there is a need to include a greater variety of Spanish documentation in the different data bases in order to overcome many of the ambiguities caused by excessive term borrowing in Spanish.</span></p><p id="h.b8w2c3ms36gv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">sustainability, employment, expertise, competence, competition.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.abk3mkkafsdb" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>A Fast Method for Plastic Recycling</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Janusz Bobulski1 and Mariusz Kubanek, Department of Computer Science, Czestochowa University of Technology, Czestochowa, Poland</span></p><p id="h.5170nz9zfftd" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">A statistical European produces half a ton of municipal waste a year. To protect the environment, more and more waste is recycled, so that less and less ends up in landfills. We should change production methods and use recycled materials. In this article, we introduce a method to automatically recognize plastic waste so that you can reuse it. For the classification of waste, we used a feature vector based on a digital image histogram. The method is characterized by good efficiency and low computational complexity, thanks to which it can be used in small mobile devices.</span></p><p id="h.rmmp1je7bhzc" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Image processing, waste management, computer vision, plastic waste, environment protection.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.6eqc18p9kgkf" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Performance and Efficiency Assessment of Drone in Search and Rescue Operation</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Tauheed Khan Mohd, Vuong Nguyen, Trang Hoang, P. M. Zeyede and Beamlak Abdisa, Augustana College, Rock Island, Illinois, 61201, USA</span></p><p id="h.7hmogecko69z" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">With the development of technology, human beings have successfully predicted and prevented the damage caused by natural disasters. However, due to climate change, society has witnessed the rising actions of forest fire, earthquake, tsunami, etc., and there are many which people cannot prevent, and the level of dangerous situations are increasing rapidly for the Search and Rescue (SAR) operation. Not to mention, more and more people are turning their attention and hobbies to exploring wilderness where they might get lost or, worse, get injured. For that reason, to raise the chance of survival for the victims and reduce the risk for the search team, UAV (Unmanned aerial vehicles) has been proposed. The plan is to use drones to get to where men cannot enter and then report the situation. In most research papers, it seems very promising; however, there is still much work that needs to be done.</span></p><p id="h.13jjwrhxdbr7" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">UAV, AI, drone, search, rescue, efficiency.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.41xpiwfr9ptd" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>An Intelligent lock system to Improve Learning Efficiency\nusing Artificial Intelligence and Internet of Things</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ivy Chen</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Ang Li</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Troy High School, 2200 Dorothy Ln. Fullerton, CA 92831, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">California State University, Long Beach, 1250 Bellflower Blvd, Long Beach, CA 90840</span></p><p id="h.qhynu8pao9d1" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">According to recent statistics, 75.4% consider themselves addicted to their phones, and 78 percent of teenagers check their mobile devices at least hourly [2]. The purpose of this paper is to propose a tool that lowers users’ dependence on their electronic devices. The Phone cage created is able to lock one’s electronic device for as long as they set the time on the associated mobile application. The mobile application will keep the Phone cage locked and display a countdown of when the lock will be released. The cage will not reopen until the timer goes to zero. The ef ect of this tool extends to: 1. Prevents/lowers phone addiction [3]. 2. Increases productivity by isolating distraction [4]. 3. Motivate one to be more self-controlled. Our tool was created successfully using Tinker cad, 3D- printer, Thunkable, Firebase console, and Raspberry Pi Zero. -The Tinker cad was used to design the overall Phone cage and lock; -The 3D- printer was used to print out the physical Phone cage [5]; -Thunkable was used to create the Phone cage app, which allows the user to set the time using a slide bar; -Firebase console was used to store and conserve the data, Inspect the timestamp, unlock time, and whether the Phone cage is locked or not -Raspberry Pi Zero was used to control the micro servos arm to turn the slide lock We applied our application by distributing the phone cage to ten randomly selected people across all age groups and conducted a qualitative evaluation of the approach. The result shows that the phone cage tremendously shrunk their work time and produced work with equal, if not higher quality.</span></p><p id="h.l4m1kil5qje6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Phone cage, Smartphone, Raspberrypi, IOS/Android.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.ik4vomecnsdd" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>An Intelligent News-based Stock Pricing Prediction using AI and Natural Language Processing</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Sirui Liu</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Yu Sun</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Orange Lutheran High School, 2222 N Santiago Blvd, Orange, CA 92867, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">California State Polytechnic University, Pomona, CA, 91768, Irvine, CA 92620</span></p><p id="h.oeydnydeqq42" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">How do you know which stock is the right stock to invest in and have no risk of losing their money [1]? Even though there are analysis specialists out there to collect data to calculate which stock is good to be invested in, ultimately people could not af ord the cost of specialists and specialists are not able to be there every minute that you want to find them. Therefore, the app Stock Recommendation is created to solve this problem where stock investment suggestions are available in touch anywhere and anytime [2]. This application helps us with what we want to invest in and gather information from recent news to show us about the public opinions towards the stock that we are looking for. Investors will no longer struggle with the problem that is the stock that they want to invest in, a good stock or a bad stock, so no money will be lost from the investors pocket and rather, they will gain my money [4].</span></p><p id="h.1s4w80o7r463" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Stock, machine learning, AI.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.6xaf74lltwr8" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Evaluation of Machines Learning Algorithms in Detection of Malware-based Phishing Attacks for Securing E-Mail Communication</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Kambey L. Kisambu and Mohamedi Mjahidi, University of Dodoma, Tanzania</span></p><p id="h.ik1ebwnmmqrh" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Malicious software, commonly known as Malware is one of the most significant threats facing Internet users today. Malware-based phishing attacks are among the major threats to Internet users that are difficult to defend against because they do not appear to be malicious in nature. There were several initiatives in combating phishing attacks but there are many difficulties and obstacles encountered. This study deals with evaluation of machine learning algorithms in detection of malware-based phishing attacks for securing email communication. It deeply evaluate the efficacy of the algorithms when integrated with major open-source security mail filters with different mitigation techniques. The main classifiers used such as SVM, KNN, Logistic Regression and Naïve Bayes were evaluated using performance metrics namely accuracy, precision, recall and f-score. Based on the findings, the study proposed improvement for securing e-mail communication against malware-based phishing using the best performing machine-learning algorithm to keep pace with malware evolution.</span></p><p id="h.r6sa0jnl1sk8" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Malware, Malware Analysis, Malware-based, Phishing attacks, Spams, e-mails, Machine learning, algorithms, mail filters, Detection, Mitigation techniques.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.kjyja647n38z" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Towards an Efficient FAIRification Approach of Tabular Data with Knowledge Graph Models</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Wiem Baazouzi</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Marouen Kachroudi</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Sami Faiz</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Universit´e de la Manouba, Ecole Nationale des Sciences de l’Informatique, Laboratoire de Recherche en g´enIe logiciel, Application Distribu´ees, Syst`emes d´ecisionnels et Imagerie intelligente, LR99ES26, Manouba 2010, Tunis, Tunisie, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Universit´e de Tunis El Manar, Facult´e des Sciences de Tunis, Informatique Programmation Algorithmique et Heuristique, LR11ES14, 2092, Tunis, Tunisie, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Universit´e de Tunis El Manar, Ecole Nationale d’Ing´enieurs de Tunis, Laboratoire de T´el´ed´etection et Syst`emes d’Information `a R´ef´erence Spatiale, 99/UR/11-11, 2092, Tunis, Tunisie</span></p><p id="h.6mrakmrdnp8" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">In this article, we present Kepler-aSI, a matching approach to overcome possible semantic gaps in tabular data by referring to a Knowledge Graph. The task proves difficult for the machines, which requires extra effort to deploy the cognitive ability in the matching methods. Indeed, the ultimate goal of our new method is to implement a fast and efficient approach to annotate tabular data with features from a Knowledge Graph. The approach combines search and filter services combined with text pre-processing techniques. The experimental evaluation was conducted in the context of the SemTab 2021 challenge and yielded encouraging and promising results.</span></p><p id="h.tgkq3hul845f" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Tabular Data, Knowledge Graph, FAIR principles.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.4z7he0vix98z" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Bangla Handwritten Single, Numeral, Vowel Modifier, And Compound Characters Recognition using CNN</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Sadia Jaman</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Mehadi Hassan Sovon</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Syed Raihanuzzaman</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Md. Mehadi Hasan</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Nusrat Nabi</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Md. Sazzadur Ahamed</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Gazi Hadiuzzaman</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer Science and Engineering, Daffodil International University, Dhaka Bangladesh, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Apparel Engineering, Bangladesh University of Textiles, Dhaka, Bangladesh</span></p><p id="h.xyc63bgxhyle" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The difficulty of handwritten character identification varies by language, owing to differences in shapes, lines, numbers, and size of characters. Several studies identified handwritten characters accessible for English in comparison with other significant languages like Bangla. A Handwritten Bangla character identification system based on CNN has been examined with the feature of labelling and normalizing the handwritten character of images and categorizing different characters. This research used almost 4,50,000 unique handwritten characters in a variety of styles. The recommended model has been proved to have a high recognition accuracy level and outperforms some of the most used methods. In this research, identify the Bangla handwritten character and digits using 189 classes consisting of 50 fundamental characters, 119 compound characters, 10 numerals, and 10 modifiers. The accuracy rate of basic characters is 84.62%, numerals 94%, modifiers 96.46%, compound characters 77.60% using created new model.</span></p><p id="h.4ijux9tbib2b" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Bangla Handwritten, Convolutional Neural Network, Recognition, Vast Dataset and Classes.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.z80eelvo57lt" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Implementation of DCS System for Compressed Air Production Unit</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Sihem Kechida</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1,*</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Ahmed Ayab</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Mouna Ayab1and Hala Mezdour</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Engineering Electrical and Automatic, University 8 Mai 1945, Guelma, Algeria, *Laboratoire d’Automatique et Informatique de Guelma, (LAIG), Algeria, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Head of service in Sonatrach Company</span></p><p id="h.8yb4cagv7hee" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">In this paper, the presented work focuses on the supervision and control of industrial systems. The idea is to develop a distributed control system (DCS) of the compressed air production unit of the SONATRACH national Company using YOKOGAWA CS3000 DCS programming software. The aim is to create a graphical interface for controlling the functional behaviour of the unit and the outlet pressure of the compressors while facilitating the operator intervention in the malfunctions case.</span></p><p id="h.gblp674ikb3g" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Supervision, Distributed Control System, Remote control, YOKOGAWA CS3000, Pressure unit.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.9qclionojnbg" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>A Pedestrian Counting Scheme for Video Images</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Chi-Cheng Cheng and Yi-Fan Wu, Department of Mechanical and Electro-Mechanical Engineering, National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C</span></p><p id="h.v4m57zxpabpb" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Pedestrian counting aims to compute the numbers of pedestrians entering and leaving an area of interest based on object detection and tracking techniques. This paper proposes a simple and effective approach of pedestrian counting that can effectively solve the problem of pedestrian occlusion. Firstly, the moving objects are detected by the median filtering and foreground extraction with the improved mixed Gaussian model. And then the HOG (Histogram of oriented gradient) features detection and the SVM (Support vector machine) classification are applied to identify the pedestrians. A pedestrian dataset containing 1500 positive samples, 12000 negative samples, and 420 hard examples, which gave the false discriminant results with the initial classifier, also considered as negative samples to enhance classification capability is employed. In addition, the Kalman filtering with BLOB analysis for dynamic target tracking is chosen to predict pedestrian trajectory. This method greatly reduces the target misjudgment caused by overlapping and completes the two-way counting. Experiments on pedestrian tracking and counting in video images demonstrate promising performance with satisfactory recognition rate and processing time.</span></p><p id="h.v8u0i89xnwwj" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Machine Vision, Kalman Filtering, Pedestrian Identification, Target Tracking, Pedestrian Counting.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.3d51kh9s5u" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Detection of Road Traffic Crashes based on Collision Estimation</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Mohamed Essam and Mohamed A. Ismail, Department of Computer Engineering, Alexandria University, Alexandria, Egypt</span></p><p id="h.9nuzatuqpf68" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">This paper introduces a framework based on computer vision that can detect road traffic crashes (RCTs) by using the installed surveillance/CCTV camera and report them to the emergency in real-time with the exact location and time of occurrence of the accident. The framework is built of five modules. We start with the detection of vehicles by using YOLO architecture; The second module is the tracking of vehicles using MOSSE tracker, Then the third module is a new approach to detect accidents based on collision estimation. Then the fourth module for each vehicle, we detect if there is a car accident or not based on the violent flow descriptor (ViF) followed by an SVM classifier for crash prediction. Finally, in the last stage, if there is a car accident, the system will send a notification to the emergency by using a GPS module that provides us with the location, time, and date of the accident to be sent to the emergency with the help of the GSM module. The main objective is to achieve higher accuracy with fewer false alarms and to implement a simple system based on pipelining technique. The system gets 93% accuracy with processing time which beat all previous systems.</span></p><p id="h.57bsrihkaf7n" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">RTCs, ViF, SVM, Deep Learning, Collision Estimation.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.9epc6z9xqet6" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>A Novel Intelligent Image-Processing Parking Systems</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Sree Veera Venkata Sai Saran Naraharisetti, Benjamin Greenfield, Benjamin Placzek, Steven Atilho, Mohamad Nassar and Mehdi Mekni, University of New Haven, West Haven, CT 06516, USA</span></p><p id="h.lnoqrf4185vp" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The scientific community is looking for efficient solutions to improve the quality of life in large cities because of traffic congestion, driving experience, air pollution, and energy consumption. This surge exceeds the capacity of existing transit infrastructure and parking facilities. Intelligent Parking Systems (SPS) that can accommodate short-term parking demand are a must-have for smart city development. SPS are designed to count the number of parked automobiles and identify available parking spaces. In this paper, we present a novel SPS based on real-time computer vision techniques. The proposed system provides features including: vacant parking space recognition, inappropriate parking detection, forecast of available parking spaces, and directed indicators toward various sorts of parking spaces (vacant, occupied, reserved and handicapped). Our system leverages existing video surveillance systems to capture, process image sequences, train computer models to understand and interpret the visual world, and provide guidance and information to the drivers.</span></p><p id="h.54u8g71xndq0" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Smart Cities, Car parking, Image Processing, Edge detection, Object Recognition.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.e4cvcemrrnbi" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Are Your Sensitive Inputs Secure in Android Applications?</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Trishla Shah, Raghav Sampangi and Angela Siegel, Dalhousie University, Halifax NS B3H 4R2, Canada</span></p><p id="h.uan0u07fy1xn" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Android applications may request for users’ sensitive information through the GUI. Developer guidelines for designing applications mandate that information must be masked/encrypted before storing or leaving the system. However not all applications adhere to the guidelines. As a prerequisite to tracking sensitive input data, it is essential to identify the widgets that request it. Previous research has focused on identifying the sensitive input widgets, but the extraction of all layouts, including images and unused layouts, is fundamental. In this paper, we propose an automated framework that finds sensitive user input widgets from Android application layouts and validates the masking of these inputs. Our design includes novel techniques for resolving the user semantics, extraction of resources, identification of potential data leaks and helping users to prioritize the sharing of sensitive information, resulting in significant improvement over prior work. We also train track the obtained sensitive input widgets and check for unencrypted transmission or storage of sensitive data. Based on a preliminary evaluation of our framework with some applications from the Google Play store, we observe notable improvement over prior work in this domain.</span></p><p id="h.xt36ynf037or" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Android applications, sensitive, secure, GUI, layouts, framework.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.68l7bkhu6udc" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>An Ant Colony Optimization Algorithm is Used to Solve Interval Transportation Problems with Mixed Constraints</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Ekanayake E.M.U.S.B.</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1*</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, Daundasekara W.B.</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Perera S.P.C</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Physical Sciences, Faculty of Applied Sciences, Rajarata University of Sri Lanka, Mihinthale, Sri Lanka, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Mathematics, Faculty of Science, University of Peradeniya, Sri Lanka, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">3</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Engineering Mathematics, Faculty of Engineering ,University of Peradeniya, Sri Lanka</span></p><p id="h.flvz9byj5czb" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The Transportation Problem (TP) is another well-known optimization problem in which the goal is to minimize the total transportation cost of moving goods from one location to another. In the real world, this is a massive coordinated process. Various techniques for solving various types of transportation problems have been developed in the literature. In recent years, there has been a lot of focus on the Interval Transportation Problem (ITP). Various techniques for resolving the TP have been developed in the past, as evidenced by the literature. In this study, the ITP with mixed constraints is converted to a crisp transportation problem using the modified Ant Colony Optimization (ACO) algorithm, yielding a minimized solution. This is accomplished by incorporating the Transition Rule and Pheromone Update Rule into the ACO algorithm. This studys algorithmic approach is less complicated than well-known meta-heuristic algorithms in the literature. Finally, numerical examples are used to demonstrate the methodologys effectiveness.</span></p><p id="h.qdb4k5t5e4bv" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Interval numbers, Interval Transportation problem, Mixed constraints, Ant colony algorithm, Optimal solution.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.aoj35vlp4hds" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>NLP in Stock Market Prediction: A Review</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Rodrigue Andrawos, Computer Science and Mathematics Department, LAU, CSC688J</span></p><p id="h.g2qedc4zzho7" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Stock market prediction is the act of trying to determine the future value of a company stock or other financial instrument traded on an exchange. The successful prediction of a stock’s future price could yield significant profit. The use of Text Mining together with Machine Learning algorithms received more attention in the last years, with the use of textual content from Internet as input to predict price changes in Stocks and other financial markets. This review focuses on how can NLP be used by traders, investors, and financial analysts to get the most out of textual, numerical and sentiment analysis. Stock movements are hard to predict, but the researches covered by this review used textual and numerical data with different machine learning models to predict certain stocks’ movements, achieving promising results.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.z35jygmybkaq" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Architecture of Legal Property Documents System (ALPDS)</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Safaa Fatouh Gomaa, Doctorate in law-University of Mansoura, Master of administration Business, Eslsca School- French University</span></p><p id="h.8sdbwl9gh1ye" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">This paper investigation newly tries by the specialists in legal sciences, and technology ones, in international societies, to handle the matter the importance of the architecture of legal properties documents system. This research concentrates, generally, on the framework for the architecture of legal properties documents system, which explains; why do we need to create the architecture of legal documents system. The architecture of the legal documents system (ALPDS) represents a significant matter for all countries because it considers a legal information map that displays the legal history for countries properties to identify the legality of property actions and determine which are original, and which are forged. As a result, all countries need to create (ALPDS) that will become a formal source for legal properties documents.(S. FatouhGomaa, 2022) Consequently, the researcher will focus on identifying the importance of the architecture of legal properties documents system (ALPDS) that considers as a formal source for the legal information related to properties actions. This paper seeks to answer many questions; what is ALPDS?What are the components of ALPDS? Why do the countries need to ALPDS? What are the benefits for ALPDS? On another hand; has ALPDS a vital role to handle the downsides for legal documents administration that are related to properties actions. It hopes this research will inform the responsible international organizations for legal science to enact the rules that enhance the matter of architecture of legal properties documents system in properties actions.(S. FatouhGomaa, 2022)</span></p><p id="h.tks4elmkjlxm" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Architecture, legal science, properties actions, technology& law.</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.38; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><br></p><p id="h.qusritt7rcjt" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; vertical-align: baseline;"><strong>Insights into Today’s Cyber Trends and Threats: Meta and Base Classifier Models for Network Traffic Classification</strong></span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Rajeev Kumar</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;"> and Dr. Kavita</span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">, </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">1</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Research scholar, Department of Computer ScienceChandigarh University, Gharuan (Mohali), </span><sup style="color: #000000; font-family: 'Times New Roman'; font-size: 7.199999999999999pt; font-variant: normal; font-weight: normal;">2</sup><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Department of Computer ScienceChandigarh University, Gharuan (Mohali)</span></p><p id="h.nbrec88ef0sg" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">ABSTRACT</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">The interconnectivity between the computers that provide a single network with lots of advantages is termed as the network. A network is a scenario that allow to collect and connect a number of computers for exchanging the information and offering facilities to other resources. To detect malicious activities from the network various classification techniques are designed. The existing technique is SVM which is applied to classify data into malicious and normal classes. This research work designed a stacking technique in order to classify the network traffic. The base classifier which is used, is known as SVM and meta-classifier is KNN classifier. The proposed model is the hybrid for the network traffic classification. Python is employed to execute the designed technique and the metrics namely accuracy, precision and recall are considered to analyze the designed technique.</span></p><p id="h.8omkpbq6temi" dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4354; margin-bottom: 2pt; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">KEYWORDS</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 2.4; margin-bottom: 0; margin-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-align: justify; white-space: normal;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Network traffic classification, Meta classifier, Base Classifier SVM, KNN.</span></p></div></div></div></div></div></div></div></div></div></section><section id="h.2daa57406ec4dd68_73" class="yaqOZd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.2daa57406ec4dd68_40" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11pt; margin-left: 0; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-indent: 0;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 14pt; font-variant: normal; font-weight: normal; vertical-align: baseline;">Contact</span></p><p dir="ltr" class="CDt4Ke zfr3Q" style="background-color: transparent; border-bottom: none; border-left: none; border-right: none; border-top: none; line-height: 1.2; margin-bottom: 11pt; margin-left: 0; margin-top: 11pt; padding-bottom: 0; padding-left: 0; padding-right: 0; padding-top: 0; text-indent: 0;"><span class=" aw5Odc" style="font-family: 'Times New Roman'; font-size: 12pt; font-variant: normal; font-weight: normal; text-decoration: underline; vertical-align: baseline;"><a class="XqQF9c" href="mailto:nc.conf@yahoo.com" target="_blank">nc.conf@yahoo.com </a></span></p></div></div></div></div></div></div></div></div></div></section></div><div class="Xpil1b xgQ6eb"></div><footer jsname="yePe5c"><section id="h.2daa57406ec4dd68_7" class="yaqOZd lQAHbd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf j5pSsc db35Fc" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc"><div class="JNdkSc-SmKAyb LkDMRd"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c ZZyype Kzv0Me"><div id="h.2daa57406ec4dd68_4" class="hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb JYTMs"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb Depvyb baZpAe"><small id="h.hf8o3fd8z32v" dir="ltr" class="CDt4Ke zfr3Q TMjjoe" style="display: block; text-align: center;"><span style="color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: normal; vertical-align: baseline;">All Rights Reserved ® NC 2022 </span></small></div></div></div></div></div></div></div></div></div></section></footer><div jscontroller="j1RDQb" jsaction="rcuQ6b:rcuQ6b;MxH79b:JdcaS;FaOgy:XuHpsb;" class="dZA9kd ynRLnc" data-last-updated-at-time="1660798669107" data-is-preview="false"><div role="button" class="U26fgb JRtysb WzwrXb I12f0b K2mXPb zXBiaf ynRLnc" jscontroller="iSvg6e" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;;keydown:I481le;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="0" aria-haspopup="true" aria-expanded="false" data-menu-corner="bottom-start" data-anchor-corner="top-start"><div class="NWlf3e MbhUzd" jsname="ksKsZd"></div><span jsslot class="MhXXcc oJeWuf"><span class="Lw7GHd snByac"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span><div jsname="xl07Ob" style="display:none" aria-hidden="true"><div class="JPdR6b hVNH5c" jscontroller="uY3Nvd" jsaction="IpSVtb:TvD9Pc;fEN2Ze:xzS4ub;frq95c:LNeFm;cFpp9e:J9oOtd; click:H8nU8b; mouseup:H8nU8b; keydown:I481le; keypress:Kr2w4b; blur:O22p3e; focus:H8nU8b" role="menu" tabindex="0" style="position:fixed"><div class="XvhY1d" jsaction="mousedown:p8EH2c; touchstart:p8EH2c;"><div class="JAPqpe K0NPx"><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Google Sites" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:Toy3n;" jsname="V2zOu"><div class="jO7h3c">Google Sites</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" data-disabled-tooltip="Report abuse is not available in preview mode" aria-label="Report abuse" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jscontroller="HYv29e" jsaction="JIbuQc:dQ6O0c;" jsname="lV5oke" data-abuse-proto="%.@.null,null,"https://sites.google.com/view/nc2022/accepted-papers"]" data-abuse-reporting-widget-proto="%.@.null,"https://sites.google.com/view/nc2022/accepted-papers"]"><div class="jO7h3c">Report abuse</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8" jsname="j7LFlb" aria-label="Page details" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:hriXLd;" jsname="Rg8K2c"><div class="jO7h3c">Page details</div></div></span></div></div></div></div></div></div><div jscontroller="j1RDQb" jsaction="focusin:gBxDVb(srlkmf); focusout:zvXhGb(srlkmf); click:ro2KTd(psdQ5e);JIbuQc:DSypkd(Bg3gkf);MxH79b:JdcaS;rcuQ6b:rcuQ6b;" class="LqzjUe ynRLnc" data-last-updated-at-time="1660798669107" data-is-preview="false"><div jsname="psdQ5e" class="Q0cSn"></div><div jsname="bN97Pc" class="hBW7Hb"><div role="button" class="U26fgb mUbCce fKz7Od kpPxtd QMuaBc M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="-1" aria-hidden="true"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span></div><div jsname="srlkmf" class="hUphyc"><div class="YkaBSd"><div class="iBkmkf"><span>Page updated</span> <span jsname="CFIm1b" class="dji00c" jsaction="AHmuwe:eGiyHb; mouseover:eGiyHb;" tabindex="0" role="contentinfo"></span></div></div><div class="YkaBSd" jsaction="click:Toy3n;"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow jsname="V2zOu" aria-disabled="false" tabindex="0">Google Sites</div></div><div class="YkaBSd" jscontroller="HYv29e" jsaction="click:dQ6O0c;" data-abuse-proto="%.@.null,null,"https://sites.google.com/view/nc2022/accepted-papers"]" data-abuse-reporting-widget-proto="%.@.null,"https://sites.google.com/view/nc2022/accepted-papers"]"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow aria-label="Report abuse" aria-disabled="false" tabindex="0">Report abuse</div></div></div></div></div></div></div></div><script nonce="A8oSP_HaJKvApzlLa1nfMA">DOCS_timing['cov']=new Date().getTime();</script><script src="https://www.gstatic.com/_/atari/_/js/k=atari.vw.en_US.fw_mAcuwUyE.O/am=MBiA/d=1/rs=AGEqA5lwNXFYaHUUDGYHiMqlOO36DqQAOw/m=view" id="base-js" nonce="A8oSP_HaJKvApzlLa1nfMA"></script></div></div><div jscontroller="YV8yqd" jsaction="rcuQ6b:npT2md"></div></body></html>