skip to main content
10.1145/3377049acmotherconferencesBook PagePublication PagesiccaConference Proceedingsconference-collections
ICCA 2020: Proceedings of the International Conference on Computing Advancements
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICCA 2020: International Conference on Computing Advancements Dhaka Bangladesh January 10 - 12, 2020
ISBN:
978-1-4503-7778-2
Published:
20 March 2020
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 18 Jan 2025Bibliometrics
research-article
Toddler Sensory-Motor Development for Object Manipulation by Analyzing Hand-Pose
Article No.: 1, Pages 1–7https://doi.org/10.1145/3377049.3377055

A toddler learns to hold various types of objects using hands in their everyday life without any specific instruction from an adult. The main media of interaction happens using the hands. A toddler's sensory-motor is developed by manipulating various ...

research-article
Predicting the Demand of Prescribed Medicines in Bangladesh using Artificial Intelligent (AI) based Long Short-Term Memory (LSTM) Model
Article No.: 2, Pages 1–5https://doi.org/10.1145/3377049.3377056

Health services are one of the necessities for a human being. Good quality and timely health services are essential for proper health conditions of human requirement. Distribution of health care facilities and services are imperative in any nation thus ...

short-paper
Improving Natural Language Parser Accuracy by Unknown Word Replacement
Article No.: 3, Pages 1–7https://doi.org/10.1145/3377049.3377124

Natural language parsers are the basis for further understanding the content written in natural language. Parsers for natural language have been shown to be effective in many NLP tasks, such as, machine translation, sentiment analysis and classification ...

research-article
Hybridization of Evolutionary and Swarm Intelligence Algorithms for improved performance: A case study with TSP problem
Article No.: 4, Pages 1–7https://doi.org/10.1145/3377049.3377060

This paper conducts the hybridization of Swarm intelligence and Evolutionary Algorithm for Continuous and Discrete optimization. Optimization is the process of selecting the best element by following some rules and criteria from some set of available ...

research-article
A decentralized computational system built on blockchain for educational institutions
Article No.: 5, Pages 1–6https://doi.org/10.1145/3377049.3377058

An educational institute demands significant computational resources for which it mostly relies on centralized servers, networks and storage facilities. Currently these systems are built around the centralized model which exposes it to risks of data ...

research-article
Barriers to Growth of Renewable Energy Technology in Bangladesh: Case of Solar Home System in Rural Regions
Article No.: 6, Pages 1–6https://doi.org/10.1145/3377049.3377086

Contribution of energy towards sustainable development is uncontested. Since energy demand is increasing, and so does the concern about environment and climate change, renewable energy (RE) is being considered a tool to provide access to electricity and ...

research-article
BUMAR: A Blockchain-Empowered UAV-Assisted Smart Surveillance Architecture for Marine Areas
Article No.: 7, Pages 1–5https://doi.org/10.1145/3377049.3377062

Trespassing in the marine area is a very critical issue. As a result, countries are losing revenue as well as it's a threat against the sovereignty of the country. As sea area is large, it's not always possible to monitor every part in real-time. ...

research-article
Secured Blockchain Based Decentralised Internet: A Proposed New Internet
Article No.: 8, Pages 1–7https://doi.org/10.1145/3377049.3377083

Throughout this paper, we try to describe with blockchain technology the decentralization of the internet. A decentralized network that encourages the internet to operate from the smartphone or tablet of anybody instead of centralized servers. A ...

research-article
Evaluation of Four SDN Controllers with Firewall Modules
Article No.: 9, Pages 1–8https://doi.org/10.1145/3377049.3377050

Software Defined Networking (SDN) is a revolutionary concept that has taken the networking industry by storm. It provides robust control over its network elements by ensuring programmability and customization of network policies. Gone are the days where ...

research-article
Hidden Markov Model based Trust Management Model for Underwater Wireless Sensor Networks
Article No.: 10, Pages 1–5https://doi.org/10.1145/3377049.3377054

With the massive improvement in sensing techniques, government agencies and researchers are interested in exploring underwater resources by deploying underwater sensor nodes. The harsh random environment and open acoustic channel are the main two ...

research-article
Reducing Redundancy by Optimizing Dominant Pruning Algorithm for Wireless Ad Hoc Networks
Article No.: 11, Pages 1–9https://doi.org/10.1145/3377049.3377073

Broadcasting is a fundamental operation in wireless ad hoc network that occurs when a transmitted data packet from source needs to be received by all nodes of the network. Because of the mobility of wireless ad hoc network, broadcast scheduling cannot be ...

short-paper
Design and Performance Evaluation of Eight Channel WDM Based PON with CSRZ-QPSK Transmitter Configuration
Article No.: 12, Pages 1–4https://doi.org/10.1145/3377049.3377075

In this paper, One Mach-Zehnder Modulation and carrier suppressed return to zero differential quadrature phase-shift keying (CSRZ-QDPSK) transmitter based wavelength-division-multiplexed passive optical network (WDM-PON) is designed. Eight sources with ...

short-paper
A Hybrid Framework for Interconnecting Various Software Engineering Process Models and Techniques
Article No.: 13, Pages 1–4https://doi.org/10.1145/3377049.3377065

In the software development lifecycle, a software process model provides a standardized format for planning, organizing, and executing a software project. Dozens of different models exist and are used in the software industries, but many of them has only ...

research-article
An approach to secure multi-tier websites through SQL-Injection detection and prevention
Article No.: 14, Pages 1–7https://doi.org/10.1145/3377049.3377096

The vulnerability of SQL injection allows attackers to directly flow commands into the database of the underlying web application and destroy their functions or confidentiality. In recent times it has gone from threatening the front ends of the web ...

research-article
Relaxed Reorder Buffer Commit with Batch Context Switch
Article No.: 15, Pages 1–5https://doi.org/10.1145/3377049.3377088

Most of the modern processors achieve instruction level parallelism by executing instructions without the original program order. Although the instructions can execute without preserving the original program sequence, they must commit in-order once ...

short-paper
An Analysis of Incentive Model (PII) to Maximize the Beneficiary Outreach by Ensuring Privacy
Article No.: 16, Pages 1–4https://doi.org/10.1145/3377049.3377090

This research predominantly proposes a system that assures the PII (Personal Identification Information) of the beneficiary or the victim always remains confidential who holds a valid account of the social service system and assesses the security aspects'...

research-article
Robust Underwater Object Detection with Autonomous Underwater Vehicle: A Comprehensive Study
Article No.: 17, Pages 1–10https://doi.org/10.1145/3377049.3377052

Underwater Object Detection had been one of the most challenging research fields of Computer Vision and Image Processing. Before Computer Vision techniques were used for underwater imaging, all the tasks associated with object detection had to be done ...

short-paper
Automatic Control Point Selection System based Anthropomorphic Animal Face Masking
Article No.: 18, Pages 1–4https://doi.org/10.1145/3377049.3377057

Anthropomorphic animal face masking is the process where human characteristics are plotted on the animal kinds. The term anthropomorphic derived from anthropomorphism, which means displaying animals, gods, and other objects as if they are human in ...

research-article
Extracting Relevant Information Using Handheld Augmented Reality
Article No.: 19, Pages 1–6https://doi.org/10.1145/3377049.3377069

Augmented Reality (AR) technology is being incorporated into education materials to attract students and to make the learning experience more engaging. This study focuses on the development of 3D object, audio-visual and interaction in Handheld AR. This ...

research-article
A Deep Convolutional Neural Network Based Small Scale Test-bed for Autonomous Car
Article No.: 20, Pages 1–5https://doi.org/10.1145/3377049.3377076

In deep end-to-end learning based autonomous car design, inferencing the signal by trained model is one of the critical issues, particularly, in case of embedded component. Researchers from both academia and industry have been putting their enormous ...

research-article
A Comparative Sentiment Analysis On Bengali Facebook Posts
Article No.: 21, Pages 1–8https://doi.org/10.1145/3377049.3377078

The proliferation of social network is generating a huge amount of texts and drawing attentions. Sentiment Analysis (SA) extracts useful information from such data. Maximum researches on SA have been done on the English language, but others main ...

research-article
A Stylometric Approach for Author Attribution System Using Neural Network and Machine Learning Classifiers
Article No.: 22, Pages 1–7https://doi.org/10.1145/3377049.3377079

The paper discusses few methods of author attribution system in Bengali literature through stylometric approach. Our goal is to examine whether it is possible to identify the actual writers of some unknown Bangla documents by using a machine learning ...

short-paper
ANFIS based authentication performance evaluation for enhancing security in Internet of Things
Article No.: 23, Pages 1–4https://doi.org/10.1145/3377049.3377089

In this paper, we introduce a robust authentication mechanism for identification in order to secure the wireless channel in IoT networks. Internet of Things is viewed as the most scaled down segment of nano sensor systems that have a significant ...

research-article
Blood Count Prediction for Disease Prognosis based on Combined Multi-modal Interaction Model with Related Attributes
Article No.: 24, Pages 1–7https://doi.org/10.1145/3377049.3377059

Many machine learning approaches have been applied in order to predict different types of diseases over last few years. Early diagnosis and prognosis depending on these predictions have become very necessary for further treatment policy in different ...

research-article
An Automated Model using Deep Convolutional Neural Network for Retinal Image Classification to Detect Diabetic Retinopathy
Article No.: 25, Pages 1–8https://doi.org/10.1145/3377049.3377067

Diabetic Retinopathy is considered as one of the significant reasons for vision impairment. Its identification involves detecting the presence of some features in retinal fundus images by clinicians which is a time and resource consuming procedure and a ...

research-article
Adaptive Feature Selection and Classification of Colon Cancer From Gene Expression Data: an Ensemble Learning Approach
Article No.: 26, Pages 1–7https://doi.org/10.1145/3377049.3377070

Cancer research is one of the major and significant areas in medical research. A substantial number of research has been performed in this area and several methods have been employed. However, accuracy of cancer prediction is yet to reach near perfection ...

research-article
A Boolean network inference from time-series gene expression data using a statistical method
Article No.: 27, Pages 1–5https://doi.org/10.1145/3377049.3377080

Accurate gene regulatory network inference from time-series data is a challenging problem in computational biology. Recently, various methods have been developed to infer a gene regulatory network from time series data. Most of which are not scalable, ...

research-article
Analysis of Brain Wave Data Using Neurosky Mindwave Mobile II
Article No.: 28, Pages 1–4https://doi.org/10.1145/3377049.3377053

Human Brain, a very complex part of the human body which generates various types of signals of different frequency in wakefulness or sleeping period. By using these dissimilar types of frequencies brain waves can be distinguished from each other. And ...

research-article
A Context-Based Searching Technique by Extraction and Fusion of Metadata of Digital Photos
Article No.: 29, Pages 1–7https://doi.org/10.1145/3377049.3377061

Memories of events hold the essence of human life. To preserve and restore the ailing memories, digital photo is the most popular approach. In this paper, we present a technique to create a semi-automatic photo memorandum for context-based photo ...

research-article
Mutual Context-based Word Prediction for Internet Messenger Chat
Article No.: 30, Pages 1–6https://doi.org/10.1145/3377049.3377071

Digital communication, being a part of everyday life, keeps everyone connected on the fly mostly via chat and text messaging. While chatting and texting the users are assisted in typing by many predicted and suggested words provided by the keyboard. ...

Index terms have been assigned to the content through auto-classification.

Recommendations