posted by user: aircc_cfp || 4639 views || tracked by 5 users: [display]

CMLA 2019 : Call for Participation - International Conference on Machine Learning & Applications


When Nov 23, 2019 - Nov 24, 2019
Where Zurich, Switzerland
Submission Deadline Nov 22, 2019
Categories    machine learning   artificial intelligence   computer science   NLP

Call For Papers

Call for Participation - International Conference on Machine Learning & Applications (CMLA 2019)

November 23 ~ 24, 2019, Zurich, Switzerland

Call for Participation

We invite you to join us in Zurich, Switzerland on November 23 ~ 24, 2019, for International Conference on Machine Learning & Applications (CMLA 2019)

will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.

Highlights of CMLA 2019 include:

Registration Participants

Non-Author / Co-Author/ Simple Participants (no paper)

390 EURO (With proceedings)

For registration and details mail: or

Accepted Papers

A Hybrid Model for Evacuation Simulation and Efficiency Optimization in Large Complex Buildings

Hao Yuan, Guo Yu, Yifan Ma, Jieneng Chen, Xiongda Chen, Tongji University, China

Quality Model to the Adaptive Guidance

Hamid Khemissa1 and Mourad Oussala2, 1Computer Systems Laboratory, Faculty of Electronics and Informatics, Computer Science Institute, USTHB: University of Science and Technology Houari Boumediene, Algiers; Algeria and 2Laboratoire des Sciences du Numérique de Nantes (LS2N), Faculty of sciences, Nantes University, France

Collaborative and Fast Decryption Using Fog Computing and A Hidden Access Policy

Ahmed Saidi1, Omar Nouali2 And Abdelouahab Amira3, 1, 2, 3Department Of Computer Security, Research Center For Scientific And Technical Information, Algiers, Algeria and 1, 3Faculty Of Exact Sciences, Universite De Bejaia, 06000 Bejaia, Algeria

Upgrading Cloud Infrastructure – Challenges and Solutions

Andrei Petrescu and Mihai Carabas, University POLITEHNICA of Bucharest, Splaiul Independentei 313, Bucharest, Romania

Semantic Document Classification based on Strategies of Semantic Similarity Computation and Correlation Analysis

Shuo Yang1, Ran Wei2, Hengliang Tan1 and Jiao Du1, 1School of Computer Science and Cyber Engineering Guangzhou University, Guangzhou, China and 2Department of Computer Science University of California, Irvine, California, USA

Automated Generation of Computer Graded Unit Testing-Based Programming Assessments for Education

Sébastien Combéfis1,2 and Guillaume de Moffarts2, 1ECAM Brussels Engineering School, Brussels, Belgium and 2Computer Science and IT in Education ASBL, Louvain-la-Neuve, Belgium

SFERANET: Automatic Generation of Football Highlights

Vincenzo Scotti, Licia Sbattella and Roberto Tedesco, DEIB, Politecnico di Milano, Milano, Italy

Automation Regression Testing for SAS.AM Website

Harutyun Berberyan and Shahid Ali, Department of Information Technology, AGI Institute, Auckland, New Zealand

Secure and Privacy-aware Data Collection Architecture Approach in Fog Node Based Distributed IoT Environment

Moussa WITTI and Prof. Dimitri KONSTANTAS, Information Science Institute University of Geneva Route de Drize 7, 1227 Carouge, Switzerland

An Intelligent Mobile Application to Manage College Database and Recommendation Using Data Mining

Yixian Qi1, Qi Lu2, Yu Su3 and Fangyan Zhang4, 1Valencia High School, Placentia, CA 92870, 2Department of Social Science, University of California, Irvine, Irvine, CA, 92697, 3Department of Computer Science, California State Polytechnic University, Pomona, CA, 91768 and 4ASML, San Jose, CA, 95131

TRIT: A Robust Tracker Based on Triplet Network

Peng Zou and Yunfei Cai, Department of Intelligent Science and Technology, Nanjing University of Science and Technology, Nanjing, China

Customized Garment Fashion Recommendation System Using Data Mining Techniques

Shukla Sharma1,2,3,Ludovic Koeh1,2,Pascal Bruniaux1,2, Xianyi Zeng1,2, 1 Gemtex, 2Ensait, 3Ecole Centrale De Lille Lille, France

Abstractive text summarization using Transformer based deep learning

SXin Liu, Computer science and Technology, Beijing University of Posts and Telecommunications, Beijing, China

Toward A Framework to Implement A Master Data Management under SOA

Chafika Benkherourou, Computer Science Department, University of Batna 2, Batna, Algeria.

Cognitive Cities an Architectural Framework for the Cities of the Future

Cristiana Carvalho1,Filipe Cabral Pinto1,Isabel Borges1,Gonçalo Machado2and Ilídio Oliveira 1Altice Labs, Aveiro, Portugal and 2Departamento de Eletrónica, Telecomunicações e Informática, University of Aveiro, Aveiro, Portugal.

Anomaly-based Intrusion Detection for Hyper Large Industrial IoT Networks

Mohammad Rmayti, Alexis Olivereau and Baptiste Polvé, CEA, LIST, Communicating Systems Lab, 91191 Gif-sur-Yvette CEDEX, France

Prediction and Causality Analysis of Churn Using Deep Learning

Muzaffar Shah, Darshan Adiga, Shabir Bhat and Viveka Vyeth, Datoin Bangalore, India

A Novel Machine Learning System for Sentiment Analysis and Extraction

Osama Mohammad Rababah and Nour Alokaily, Information Technology Department, The University of Jordan, Amman, Jordan

Fuzzy logic for E-recruitment

Abdessamad OUZNINI, Youssef FAKIR, Mohamed FAKIR, Bouzekri MOUSTAID, Department of computer Sciences Faculty of science and Technology, University Sultan Moulay Slimane, Beni Mellal, Morocco

A Comparison of Unsupervised Anomaly Detection Methods on a Unified Host and Network Dataset

Catherine Beazley1, Karan Gadiya1,Rakesh Ravi1,David Roden1,Boda Ye 1,Brendan Abraham 2,Donald Brown 1,Malathi Veeraraghavan 31 Data Science Institute, University of Virginia, Charlottesville, USA, 2Department of Systems and Information Engineering, University of Virginia, Charlottesville, USA and3Department of Electrical and Computer Engineering, University of Virginia, Charlottesville, USA

An Artificial Neural Network Approach for the Classification of Human Lower Back Pain

Shubham Sharma and Rene V. Mayorga, Industrial Systems Engineering, University of Regina, Canada

Prediction of Workpiece Quality: An Application of Machine Learning in Manufacturing Industry

Günther Schuh, Paul Scholz, Sebastian Schorr, Durmus Harman, Matthias Möller, Jörg Heib, Dirk Bähre

Automated Music Making with Recurrent Neural Network

You Peng1,Yao Pan2, Qi Lu3, 1Department of Computer Science California State Polytechnic University, Pomona, CA, 917682LinkedIn Corporation Sunnyvale, CA 94085 and 3Department of Social Science University of California, Irvine, CA, 92697

In Hindsight: A Smooth Reward for Steady Exploration

Hadi Samer Jomaa and Josif Grabocka and Lars Schmidt-Thieme, Information Systems and Machine Learning Lab Universtiry of Hildesheim, Germany

Lifetime Extension of Ad Hoc Wireless Network with Shadowing Effects

Amir J. Majid; Ph.D, College of Engineering, University of Science and Technology of Fujairah, UAE.

Measurement and Characterization of the Stationary Noise in Narrowband Power Line Communication

Raja Alaya and Rabah Attia, Tunisian Polytechnic School, University of Carthage, Tunisia

Token Bucket-based Throughput Constraining in Cross-layer Schedulers

Jeremy Van den Eynde and Chris Blondia, University of Antwerp - imec, IDLab - Department of Mathematics and Computer Science, Sint-Pietersvliet 7, 2000 Antwerp, Belgium

SS EMS :A Smart and Secure Framework of Energy Management System

Jaspreet Kaur and Sumit Kalra, Department of Computer Science & Engineering Indian Institute of Technology Jodhpur Jodhpur, India

Methodology to Evaluate WSN Simulators: Focusing on Energy Consumption Awareness

Michel Bakni1,Luis Manuel Moreno Chacon2,Yudith Cardinale2 ,Guillaume Terrasson1,and Octavian Curea1, 1Univ. Bordeaux, ESTIA Institute of Technology, F-64210 Bidart, France and 2Universidad Simon Bolivar, Caracas, 1080-A, Venezuela

Motion estimation from noisy image sequences using new frequency weighting functions

El Mehdi Ismaili Alaoui, Laboratory of Computer Networks and Systems Faculty of Sciences, Moulay Ismail University Meknes-Morocco

Split Multi-stage Vector Quantization Based Steganography for Secure Wideband Speech Coder

Merouane BOUZID and Bakkar LASKAR, Electronics Faculty, University of Sciences and Technology Houari Boumediene(USTHB), Algeria

Segmentation of Single and Overlapping Leaves by Extracting Appropriate Contours

Rafflesia khan and Rameswar Debnath, Computer Science and Engineering Discipline, Khulna University, Khulna, Bangladesh

Lane Detection for Prototype Autonomous Vehicle

Sertap Kamçi, Dogukan Aksu and Muhammed Ali Aydin, Computer Engineering Department, Istanbul University-Cerrahpasa, Istanbul, Turkey

Nature-inspired Meta-heuristic Optimization Algorithms: Grey Wolf Optimization, Dolphin Swarm Optimization, And Bacterial Foraging Optimization

Büsra Rümeysa Mete, Dogukan Aksu and Emel Arslan, Computer Engineering Department, Istanbul University-Cerrahpasa, Istanbul, Turkey

Design a simple printed antenna with DGS structure for UWB/SWB applications

Tarek Messatfa, Fouad Chebbara, Abdelkarim Belhedri, and Abderrahim Annou, Department of Electronic and Telecommunications, Electrical Engineering Laboratory (LAGE), University of Kasdi Merbah Ouargla, Ouargla, Algeria

A Fair Electronic Voting System Using Blockchain

ChangHyun Roh and YongWoon Hwang and Im-Yeong Lee, SoonChunHyang University, Asan, Republic of Korea

Public-Key Based Authentication Architecture for IoT Devices Using PUF

Haji Akhundov1,Erik van der Sluis2,Said Hamdioui1and Mottaqiallah Taouil1, 1Delft University of Technology, Delft, The Netherlands and 2Intrinsic ID B.V., Eindhoven, The Netherlands

Securing Digital Signature Algorithm Against Side Channel Attacks

Mohamed. N. Hassan Ahmed1,S. Abo-Taleb2,Mohamed Shalaby3, 1University of Calgary, Calgary, Canada, 2Ain Shams university, Cairo, Egypt and 3Egyptian Armed Forces,Arab Academy for science Technology and Maritime Transport, Cairo, Egypt

Cognizance of data to action techniques for IoT environments

Pushpinder Kaur Chouhan, Md Israfil Biswas, Naveed Khan, Chris Nugent, and Philip Morrow, Ulster University, Jordanstown, UK

Security Framework for IoT Devices Against Cyber-attacks

Aliya Tabassum and Wadha Lebda, Department of Computer Science and Engineering, Qatar University, Doha, Qatar

Layman’s Understanding Approach to the Internet of Things (IoT) Concepts and Applications

Rajeev Kanth1,Tuomas Korpi1 ,Arto Toppinen1 ,Kimmo Myllymäki1 ,Jatin Chaudhary2,3, Jukka Heikkonen3, 1Savonia University of Applied Sciences, Opistotie 2, 70150 Kuopio, Finland,2University of Turku, Vesilinnantie 5, 20520 Turku, Finland and 3Sardar Vallabhbhai National Institute of Technology, Surat India

Hybrid Application Layer Protocol Design for IoT Environments

Erdal ÖZDOGAN1,and O.Ayhan ERDEM2, 1Department of Information Systems, Gazi University, Ankara, Turkey and 2Department of Computer Engineering, Gazi University, Ankara, Turkey

Related Resources

ICDMML 2020   【EI SCOPUS】2020 International Conference on Data Mining and Machine Learning
ICML 2020   37th International Conference on Machine Learning
MNLP 2020   4th IEEE Conference on Machine Learning and Natural Language Processing
AICA 2020   O'Reilly AI Conference San Jose
IJCAI 2020   International Joint Conference on Artificial Intelligence
17th ICTEL September Barcelona 2020   17th ICTEL 2020 – International Conference on Teaching, Education & Learning, 31 Aug -01 Sep, Barcelona
ISBDAI 2020   【Ei Compendex Scopus】2020 International Symposium on Big Data and Artificial Intelligence
MAAIDL 2020   Springer Book 'Malware Analysis using Artificial Intelligence and Deep Learning'
ACL 2020   The 58th Annual Meeting of the Association for Computational Linguistics
11th ICTEL June, Paris 2020   11th ICTEL 2020 – International Conference on Teaching, Education & Learning, 08-09 June, Paris