| # |
Poster Title |
Author |
| 1 |
Adaptive Grammatical Evolution in a Particle Swarm Optimisation Setting |
Jyotheesh Gaddam, Maia Angelova, Jan Carlo Barca and Richard Dazeley |
| 2 |
A framework for retaining women in Information Technology studies |
Jane Joseph |
| 3 |
Analysing the forum activities inside the Dark Web |
Hürol Türen, Rafiqul Islam and Kenneth Eustace |
| 4 |
A pilot study of using facial electromyography |
Jacqueline Bailey and Karen Blackmore |
| 5 |
Applications and roadmap of the clowder open-source data management framework |
Chen Wang, Luigi Marini, Max Burnette, Todd Nicholson, Mike Lambert, Rob Kooper, Hoang Nguyen and Kenton McHenry |
| 6 |
Applying enhanced artificial intelligence towards detecting digital payment fraud |
Nnamdi Odenigbo, Krassie Petrova and Parma Nand |
| 7 |
A secure provenance system architecture for distributed storage systems |
Hetong Jiang |
| 8 |
Automating text processing in general practice |
David Fraile Navarro, A. Baki Kocaballi, Mark Dras and Shlomo Berkovsky |
| 9 |
Changes in organisational resilience strategies due to cybersecurity challenges during WFS in Covid-19 pandemic |
Samreen Mahmood, Mehmood Chadhar and Selena Firmin |
| 10 |
Computer system for scalable deep learning |
Volodymyr Kindratenko, Dawei Mu, Yan Zhan and J.D. Maloney |
| 11 |
Context cost quality engine (ConCQeng) |
Kanaka Sai Jagarlamudi, Arkady Zaslavsky, Seng Loke, Alireza Hassani and Alexey Medvedev |
| 12 |
Corona code reference autonomous assistance |
Muftah Afrizal Pangestu and Simon |
| 13 |
Customization of order alerts through filters: Impact on pharmacists’ override rate and perceptions of alert fatigue |
Daniel Chan |
| 14 |
DDoS readiness and capability |
Ian Wiltshire, Sujana Adapa and David Paul |
| 15 |
Defending blockchain from malicious contracts using anomaly detection |
Duy Huynh, Son Hoang Dau and Xiaodong Li |
| 16 |
Enhancing Curiosity to Motivate Learners Through Feedback in Game-Based Learning |
Anupam Makhija, Meena Jha, Deborah Richards and Ayse Bilgin |
| 17 |
Enhancing mass casualty incident training with virtual reality and artificial intelligence |
Peng Xia, Ji Ruan and Dave Parry |
| 18 |
Enhancing trajectory recovery from gradients via mobility prior |
Kaiyue Zhang, Zipei Fan, Shui Yu and Xuan Song |
| 19 |
Goodwill as the basis for an academic reset |
Andrew Stranieri and Robyn Brandenburg |
| 20 |
Hate speech detection a deep one-class SVM approach |
Saugata Bose |
| 21 |
Identifying insect microhabitat using image background analysis |
Sesa Singha Roy, Reid Tingley, Dinh Phung and Alan Dorin |
| 22 |
IoT based outdoor landscapes |
Anuroop Gaddam and Keshav Sood |
| 23 |
Measuring proficiency in creative code |
Ushini Attanayake and Ben Swift |
| 24 |
Modelling IoT application of identifying requirements and benchamrking IoT middleware platforms |
Shalmoly Mondal, Prem Prakash Jayaraman, Alireza Hassani, Pari Delir Haghighi and Dimitrios Georgakopoulos |
| 25 |
Motif-enhanced graph neural networks for recommender systems |
Yuqi Zhang, Jian Yu and Mo Nguyen |
| 26 |
PIETS:Parallelised irregularity encoders for forecasting with heterogeneous time-series |
Futoon Abu Shaqra, Hao Xue, Yongli Ren and Flora D. Salim |
| 27 |
Pre-processing, Feature extraction, and Specialization of Nominal Data |
Krishna Aryal, Meena Jha and Michael Li |
| 28 |
Private Retrieval Merkle Proofs for Light Clients with Balanced Sets in Perfect Merkle Tree |
Nhat Quang Cao, Son Hoang Dau and Xun Yi |
| 29 |
Promoting the accuracy of identifying adversarial attacks with IDS |
Mingjian Tang and Shui Yu |
| 30 |
Strategy transfer by AI agent |
Archana Vadakattu, Adrian Pearce and Michelle Blom |
| 31 |
Telemedicine consultation as-an intervention tool to mitigate covid induced Generalized Anxiety Disorder |
Samia Amin, Ashish Joshi |
| 32 |
The future SOILS project |
Sergio José Rodríguez Méndez, Pouya Ghiasnezhad Omran, Kerry Taylor, Priscilla Kan John, Tom Gedeon and Anne-Maree Farley |
| 33 |
The utility of reinforcement learning to enhance decision support in air battle management |
Kevin McDonald, Adrian Pearce, Michelle Blom and Michael Papasimeon |
| 34 |
Transformer Compressed Sensing via Global Image Tokens |
Marlon Bran Lorenzana and Shekhar Chandra |
| 35 |
Understanding the role of in-memory database technology on business process reengineering |
Haroon Bhutta, Andrew Stranieri and Mehmood Chadhar |
| 36 |
We trust Facebook we trust mobile apps but we don’t trust our own healthcare systems like MyHealthRecord |
Wendy Burke, Andrew Stranieri, Taiwo Oseni, Iqbal Gondal and Charlynn Miller |