{"id":710,"date":"2021-03-05T16:26:11","date_gmt":"2021-03-05T16:26:11","guid":{"rendered":"http:\/\/acmse.net\/2021\/?page_id=710"},"modified":"2024-04-28T21:15:43","modified_gmt":"2024-04-28T21:15:43","slug":"schedule-papers","status":"publish","type":"page","link":"https:\/\/acmse.net\/2021\/schedule-papers\/","title":{"rendered":"Schedule of Paper Presentations"},"content":{"rendered":"<p><span style=\"display: block; font-size: 20px; padding: 10px; margin-left: 0; -webkit-border-radius: 4px; border-radius: 4px; color: white; text-shadow: 0 -1px 0 rgba(0, 0, 0, 0.25); background-color: #cb2026; background-image: -moz-linear-gradient(top, #cb2026, #cb2026);\">Schedule of Paper Presentations<\/span><\/p>\n<p>A global view of the schedule of ACMSE 2021 is available <a href=\"https:\/\/www.acmse.net\/2021\/schedule-general\" rel=\"noopener noreferrer\">here<\/a>. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as a time reference.<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2021\/schedule-papers#session1\">Session 1: Thursday, April 15, 2021 &#8211; Data Mining and Machine Learning<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2021\/schedule-papers#session2\">Session 2: Thursday, April 15, 2021 &#8211; Cybersecurity<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2021\/schedule-papers#session3\">Session 3: Thursday, April 15, 2021 &#8211; Computer and Information Science Pedagogy and Tools<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2021\/schedule-papers#session4\">Session 4: Friday, April 16, 2021 &#8211; Computer and Information Science Pedagogy and Tools<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2021\/schedule-papers#session5\">Session 5: Friday, April 16, 2021 &#8211; Neural Networks, Smartphones, and Games<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2021\/schedule-papers#session6\">Session 6: Friday, April 16, 2021 &#8211; Information Technology and Systems<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2021\/schedule-papers#session7\">Session 7: Friday, April 16, 2021 &#8211; Image Processing and Computer Vision<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2021\/schedule-papers#session8\">Session 8: Saturday, April 17, 2021 &#8211; Software Engineering<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2021\/schedule-papers#session9\">Session 9: Saturday, April 17, 2021 &#8211; IoT and Social Media<\/a><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><a name=\"session1\"><\/a><br \/>\n<span style=\"font-size:15px\">Session 1 (Data Mining and Machine Learning)<\/span><br \/>\nThursday, April 15, 2021 (10:00\u201311:55 Central Time)<br \/>\n<b>Chair of Session:<\/b> Tathagata Mukherjee (University of Alabama in Huntsville \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><b>Time<\/b><\/td>\n<td style=\"width: 10%;\"><b>Type<\/b><\/td>\n<td style=\"width: 80%; text-align: center;\"><b>Title\/Authors\/DOI<\/b><\/td>\n<\/tr>\n<tr>\n<td>10:00\u201310:25<\/td>\n<td>Full Paper<\/td>\n<td><b>Machine Learning Predictive Analytics for Player Movement Prediction in NBA: Applications, Opportunities, and Challenges<\/b><br \/>\nDembe Stephanos, Ghaith Husari, Brian Bennett, Emma Stephanos<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452064\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452064<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:25\u201310:50<\/td>\n<td>Full Paper<\/td>\n<td><b>Fast Streaming Translation Using Machine Learning with Transformer<\/b><br \/>\nJiabao Qiu, Melody Moh, Teng-Sheng Moh<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452059\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452059<\/a>\n<\/td>\n<\/tr>\n<td>10:50\u201311:15<\/td>\n<td>Full Paper<\/td>\n<td><b>Epileptic Seizures Classification in EEG Using PCA Based Genetic Algorithm Through Machine Learning<\/b><br \/>\nMd Rabby, A.K.M. Islam, Saeid Belkasim, Marwan Bikdash<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452065\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452065<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:15\u201311:35<\/td>\n<td>Short Paper<\/td>\n<td><b>Wavelet Transform-based Feature Extraction Approach for Epileptic Seizure Classification<\/b><br \/>\nMd Rabby, A.K.M. Islam, Saeid Belkasim, Marwan Bikdash<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452078\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452078<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:35\u201311:55<\/td>\n<td>Short Paper<\/td>\n<td><b>Modification and Complexity Analysis of an Incremental Learning Algorithm Under the VPRS Model<\/b><br \/>\nXuguang Chen<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452076\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452076<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session2\"><\/a><br \/>\n<span style=\"font-size:15px\">Session 2 (Cybersecurity)<\/span><br \/>\nThursday, April 15, 2021 (13:00\u201314:50 Central Time)<br \/>\n<b>Chair of Session:<\/b> Dimitrios Diochnos (University of Oklahoma \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><b>Time<\/b><\/td>\n<td style=\"width: 10%;\"><b>Type<\/b><\/td>\n<td style=\"width: 80%; text-align: center;\"><b>Title\/Authors\/DOI<\/b><\/td>\n<\/tr>\n<tr>\n<td>13:00\u201313:25<\/td>\n<td>Full Paper<\/td>\n<td><b>A Bottom-up Approach to Creating a Cyberattack Model with Fine Grain Components<\/b><br \/>\nKatia Maxwell, Mikel Petty, Daniel Colvett, Walter Cantrell<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452070\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452070<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>13:25\u201313:50<\/td>\n<td>Full Paper<\/td>\n<td><b>Teaching a Computer Forensics Course<\/b><br \/>\nFarha Ali<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452069\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452069<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>13:50-14:10<\/td>\n<td>Short Paper<\/td>\n<td><b>An Empirical Study of Thermal Attacks on Edge Platforms<\/b><br \/>\nJustin Duchatellier, Tyler Holmes, Kun Suo, Yong Shi<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452071\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452071<\/a><br \/>\n<b><span style=\"color: #0099cc\">Award: Best Short Paper<\/span><\/b>\n<\/td>\n<\/tr>\n<tr>\n<td>14:10-14:30<\/td>\n<td>Short Paper<\/td>\n<td><b>Implementing a Network Intrusion Detection System Using Semi-supervised Support Vector Machine and Random Forest<\/b><br \/>\nSandeep Shah, Pramita Muhuri, Xiaohong Yuan, Kaushik Roy, Prosenjit Chatterjee<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452073\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452073<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:30-14:50<\/td>\n<td>Short Paper<\/td>\n<td><b>Verifying Phishmon: A Framework for Dynamic Webpage Classification<\/b><br \/>\nJohn Tomaselli, Austin Willoughby, Jorge Vargas, Emma Delehanty, Katherine Floyd, Damien Wright, Mark Lammers, Ron Vetter<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452082\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452082<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session3\"><\/a><br \/>\n<span style=\"font-size:15px\">Session 3 (Computer and Information Science Pedagogy and Tools)<\/span><br \/>\nThursday, April 15, 2021 (15:00\u201316:45 Central Time)<br \/>\n<b>Chair of Session:<\/b> Sardar Haque (Alcorn State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><b>Time<\/b><\/td>\n<td style=\"width: 10%;\"><b>Type<\/b><\/td>\n<td style=\"width: 80%; text-align: center;\"><b>Title\/Authors\/DOI<\/b><\/td>\n<\/tr>\n<tr>\n<td>15:00\u201315:25<\/td>\n<td>Full Paper<\/td>\n<td><b>Meta-analysis to Study the Impact of Learning Engagement Strategies in Introductory Computer Programming Courses: A Multi-institutional Study<\/b><br \/>\nVijayalakshmi Ramasamy, Mourya Narasareddygari, Gursimran Walia, Andrew Allen, Debra Duke, James Kiper, Debra Davis<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452060\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452060<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:25\u201315:50<\/td>\n<td>Full Paper<\/td>\n<td><b>Comparison of Algorithm Learning Tools to Assist the Education of Alabama Students<\/b><br \/>\nBrian Willis, Eric Gamess, Gretchen Richards<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452062\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452062<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:50\u201316:10<\/td>\n<td>Short Paper<\/td>\n<td><b>A Study on Students&#8217; Views Toward K-12 Computer Science Teaching Career<\/b><br \/>\nDan Lo, Brian Lawler<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452075\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452075<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:10\u201316:30<\/td>\n<td>Short Paper<\/td>\n<td><b>Web-based 3D Visualization System for Anatomy Online Instruction<\/b><br \/>\nEli MacLean, Felix Hamza-Lup, April Garrity, Casey Keck, Michelle Smith<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452080\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452080<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:30\u201316:45<\/td>\n<td>Abstract<\/td>\n<td><b>Cross Courses Pedagogy Development in Data Analytics<\/b><br \/>\nYi Ding, Hyesung Park, Shuhua Lai, Shuting Xu, Yaquan Xu<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452088\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452088<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session4\"><\/a><br \/>\n<span style=\"font-size:15px\">Session 4 (Computer and Information Science Pedagogy and Tools)<\/span><br \/>\nFriday, April 16, 2021 (09:30\u201311:15 Central Time)<br \/>\n<b>Chair of Session:<\/b> Goutam Mylavarapu (Murray State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><b>Time<\/b><\/td>\n<td style=\"width: 10%;\"><b>Type<\/b><\/td>\n<td style=\"width: 80%; text-align: center;\"><b>Title\/Authors\/DOI<\/b><\/td>\n<\/tr>\n<tr>\n<td>09:30\u201309:55<\/td>\n<td>Full Paper<\/td>\n<td><b>Evaluation of Student Collaboration on Canvas LMS Using Educational Data Mining Techniques<\/b><br \/>\nUrvashi Desai, Vijayalakshmi Ramasamy, James Kiper<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452042\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452042<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:55\u201310:20<\/td>\n<td>Full Paper<\/td>\n<td><b>A Survey of Wireless Network Simulation and\/or Emulation Software for Use in Higher Education<\/b><br \/>\nTheodore Richards, Eric Gamess, David Thornton<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452066\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452066<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:20\u201310:40<\/td>\n<td>Short Paper<\/td>\n<td><b>Analysis of Students&#8217; Database Design Skills in Capstone Projects<\/b><br \/>\nShuting Xu, Lissa Pollacia, Shuhua Lai<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452081\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452081<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:40\u201311:00<\/td>\n<td>Short Paper<\/td>\n<td><b>An Evaluation of Continuous Integration and Delivery Frameworks for Classroom Use<\/b><br \/>\nJarred Light, Phil Pfeiffer, Brian Bennett<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452085\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452085<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:00\u201311:15<\/td>\n<td>Abstract<\/td>\n<td><b>Virtual App Development for Adolescents During COVID-19<\/b><br \/>\nKaylah Mackroy, Kinnis Gosha<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452089\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452089<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session5\"><\/a><br \/>\n<span style=\"font-size:15px\">Session 5 (Neural Networks, Smartphones, and Games)<\/span><br \/>\nFriday, April 16, 2021 (09:30\u201311:05 Central Time)<br \/>\n<b>Chair of Session:<\/b> Dibya Mukhopadhyay (Workday Inc. \u2013 USA)<br \/>\n<b>Room:<\/b> Room 2<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><b>Time<\/b><\/td>\n<td style=\"width: 10%;\"><b>Type<\/b><\/td>\n<td style=\"width: 80%; text-align: center;\"><b>Title\/Authors\/DOI<\/b><\/td>\n<\/tr>\n<tr>\n<td>09:30\u201309:55<\/td>\n<td>Full Paper<\/td>\n<td><b>Item Based Recommendation Using Matrix-factorization-like Embeddings from Deep Networks<\/b><br \/>\nVaidyanath Shanthakumar, Clark Barnett, Keith Warnick, Putu Sudyanti, Vitalii Gerbuz, Tathagata Mukherjee<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452041\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452041<\/a><br \/>\n<b><span style=\"color: #0099cc\">Award: Best Full Paper<\/span><\/b>\n<\/td>\n<\/tr>\n<tr>\n<td>09:55\u201310:20<\/td>\n<td>Full Paper<\/td>\n<td><b>Testbed Development for a Novel Approach Towards High Accuracy Indoor Localization with Smartphones<\/b><br \/>\nYunshu Wang, Lee Easson, Feng Wang<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452044\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452044<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:20\u201310:45<\/td>\n<td>Full Paper<\/td>\n<td><b>Game Development Workshops Designed and Delivered by Peer Mentors to Increase Student Curiosity and Interest in an Introductory Programming Course<\/b><br \/>\nXin Xu, Wei Jin<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452046\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452046<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:45\u201311:05<\/td>\n<td>Short Paper<\/td>\n<td><b>Benefits of Combining Dimensional Attention and Working Memory for Partially Observable Reinforcement Learning Problems<\/b><br \/>\nNgozi Omatu, Joshua Phillips<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452072\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452072<\/a>\n<\/td>\n<\/tr>\n<tr><\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session6\"><\/a><br \/>\n<span style=\"font-size:15px\">Session 6 (Information Technology and Systems)<\/span><br \/>\nFriday, April 16, 2021 (11:30\u201312:30 Central Time)<br \/>\n<b>Chair of Session:<\/b> Deepak Acharya\t(University of Alabama in Huntsville \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><b>Time<\/b><\/td>\n<td style=\"width: 10%;\"><b>Type<\/b><\/td>\n<td style=\"width: 80%; text-align: center;\"><b>Title\/Authors\/DOI<\/b><\/td>\n<\/tr>\n<tr>\n<td>11:30\u201311:55<\/td>\n<td>Full Paper<\/td>\n<td><b>Characterizing Networking Performance and Interrupt Overhead of Container Overlay Networks<\/b><br \/>\nKun Suo, Yong Shi, Ahyoung Lee, Sabur Baidya<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452040\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452040<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:55\u201312:15<\/td>\n<td>Short Paper<\/td>\n<td><b>Toward a Collision Avoidance System Based on the Integration of Technologies<\/b><br \/>\nCarlos Palacio, Eric Gamess<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452084\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452084<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>12:15\u201312:30<\/td>\n<td>Abstract<\/td>\n<td><b>AirFlute: A Virtual Flute and Tutoring System<\/b><br \/>\nKate Sanborn<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452087\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452087<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session7\"><\/a><br \/>\n<span style=\"font-size:15px\">Session 7 (Image Processing and Computer Vision)<\/span><br \/>\nFriday, April 16, 2021 (14:00\u201316:15 Central Time)<br \/>\n<b>Chair of Session:<\/b> Saptarshi Sengupta (Murray State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><b>Time<\/b><\/td>\n<td style=\"width: 10%;\"><b>Type<\/b><\/td>\n<td style=\"width: 80%; text-align: center;\"><b>Title\/Authors\/DOI<\/b><\/td>\n<\/tr>\n<tr>\n<td>14:00\u201314:25<\/td>\n<td>Full Paper<\/td>\n<td><b>A Computer Vision Pipeline for Automatic Large-scale Inventory Tracking<\/b><br \/>\nStephen Gregory, Utkarsh Singh, Jeff Gray, Jon Hobbs<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452063\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452063<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:25\u201314:50<\/td>\n<td>Full Paper<\/td>\n<td><b>Detecting Fabric Density and Weft Distortion in Woven Fabrics Using the Discrete Fourier Transform<\/b><br \/>\nBach Le, David Troendle, Byunghyun Jang<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452049\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452049<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:50\u201315:15<\/td>\n<td>Full Paper<\/td>\n<td><b>Detection of Local Structures in Images Using Local Entropy Information<\/b><br \/>\nTorumoy Ghoshal, Yixin Chen<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452061\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452061<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:15\u201315:40<\/td>\n<td>Full Paper<\/td>\n<td><b>A Three Layer Spatial-spectral Hyperspectral Image Classification Model Using Guided Median Filters<\/b><br \/>\nSemih Dinc, Luis Cueva<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452045\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452045<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:40\u201316:00<\/td>\n<td>Short Paper<\/td>\n<td><b>Using Cross-examples in Viola-jones Algorithm for Thermal Face Detection<\/b><br \/>\nHong Tran, Chunhua Dong, Masoud Naghedolfeizi, Xiangyan Zeng<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452083\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452083<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:00\u201316:15<\/td>\n<td>Abstract<\/td>\n<td><b>BallCaller: A Computer Vision Line Caller for Tennis<\/b><br \/>\nBryan Whitehurst<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452086\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452086<\/a><br \/>\n<b><span style=\"color: #0099cc\">Award: Best Abstract<\/span><\/b>\n<\/td>\n<\/tr>\n<tr><\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session8\"><\/a><br \/>\n<span style=\"font-size:15px\">Session 8 (Software Engineering)<\/span><br \/>\nSaturday, April 17, 2021 (09:30\u201310:45 Central Time)<br \/>\n<b>Chair of Session:<\/b> Javier Pastorino (University of Colorado Denver \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><b>Time<\/b><\/td>\n<td style=\"width: 10%;\"><b>Type<\/b><\/td>\n<td style=\"width: 80%; text-align: center;\"><b>Title\/Authors\/DOI<\/b><\/td>\n<\/tr>\n<tr>\n<td>09:30\u201309:55<\/td>\n<td>Full Paper<\/td>\n<td><b>Application of Back-translation &#8211; A Transfer Learning Approach to Identify Ambiguous Software Requirements<\/b><br \/>\nIshan Subedi, Maninder Singh, Vijayalakshmi Ramasamy, Gursimran Walia<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452068\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452068<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:55\u201310:20<\/td>\n<td>Full Paper<\/td>\n<td><b>Automated Mapping of Fault Logs to SRS Requirements Using Key-phrase Extraction<\/b><br \/>\nManinder Singh, Gursimran Walia<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452043\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452043<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:20\u201310:45<\/td>\n<td>Full Paper<\/td>\n<td><b>Encoding Feature Models Using Mainstream JSON Technologies<\/b><br \/>\nHazim Shatnawi, Conrad Cunningham<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452048\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452048<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session9\"><\/a><br \/>\n<span style=\"font-size:15px\">Session 9 (IoT and Social Media)<\/span><br \/>\nSaturday, April 17, 2021 (11:00\u201312:25 Central Time)<br \/>\n<b>Chair of Session:<\/b> Beddhu Murali (University of Southern Mississippi \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><b>Time<\/b><\/td>\n<td style=\"width: 10%;\"><b>Type<\/b><\/td>\n<td style=\"width: 80%; text-align: center;\"><b>Title\/Authors\/DOI<\/b><\/td>\n<\/tr>\n<tr>\n<td>11:00\u201311:25<\/td>\n<td>Full Paper<\/td>\n<td><b>Performance Evaluation of a Widely Used Implementation of the MQTT Protocol with Large Payloads in Normal Operation and under a DoS Attack<\/b><br \/>\nEric Gamess, Trent Ford, Monica Trifas<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452067\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452067<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:25\u201311:45<\/td>\n<td>Short Paper<\/td>\n<td><b>A Study of State-of-the-art Energy Saving on Edges<\/b><br \/>\nKousalya Banka, Kun Suo, Yong Shi, Sabur Baidya<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452079\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452079<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:45\u201312:05<\/td>\n<td>Short Paper<\/td>\n<td><b>Language Agnostic Model &#8211; Detecting Islamophobic Content on Social Media<\/b><br \/>\nHeena Khan, Joshua Phillips<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452077\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452077<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>12:05\u201312:25<\/td>\n<td>Short Paper<\/td>\n<td><b>Sentiment Analysis on COVID Tweets Using COVID-Twitter-BERT with Auxiliary Sentence Approach<\/b><br \/>\nHung Lin, Teng-Sheng Moh<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3409334.3452074\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3452074<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Schedule of Paper Presentations<\/p>\n<p>A global view of the schedule of ACMSE 2021 is available here. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as a time reference.<\/p>\n<p> Session 1: Thursday, April 15, 2021 &#8211; Data Mining and Machine Learning Session 2: Thursday, April 15, 2021 [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-710","page","type-page","status-publish","hentry","odd"],"_links":{"self":[{"href":"https:\/\/acmse.net\/2021\/wp-json\/wp\/v2\/pages\/710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acmse.net\/2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acmse.net\/2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acmse.net\/2021\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acmse.net\/2021\/wp-json\/wp\/v2\/comments?post=710"}],"version-history":[{"count":157,"href":"https:\/\/acmse.net\/2021\/wp-json\/wp\/v2\/pages\/710\/revisions"}],"predecessor-version":[{"id":989,"href":"https:\/\/acmse.net\/2021\/wp-json\/wp\/v2\/pages\/710\/revisions\/989"}],"wp:attachment":[{"href":"https:\/\/acmse.net\/2021\/wp-json\/wp\/v2\/media?parent=710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}