16.30 |
Benjamin Donnachie |
Accelerating Cyber-Breach Investigations through Novel use of Artificial Immune System Algorithms |
16.35 |
Nouf Alkaabi |
Comparing ML Models for Food Production Forecasting |
16.40 |
Mian Awais |
Comparing Peircean Algorithm with Various Bio-inspired Techniques for Multi-dimensional Function Optimization |
16.45 |
Dalila Durães |
Medical Recommendation System Based on Daily Clinical Reports: A Proposed NLP Approach for Emergency Departments |
16.50 |
Lakshmi Babu Saheer |
Credit Card Fraud Using Adversarial Attacks |
16.55 |
Dalila Durães |
MentaLex: a Mental Processes Lexicon based on the Essay dataset |
17.00 |
Daem Pasha |
Anomaly Detection and Root Cause Analysis on Log Data |
17.05 |
Carl James-Reynolds |
Developing Testing Frameworks for AI Cameras |
17.10 |
Filipo Perotto |
Time is Budget: A Heuristic for Reducing the Risk of Ruin in Multi-Armed Gambler Bandits |
17.15 |
Mahdi Maktabdar Oghaz |
Two Phase Open-Domain Question Answering System |
17.20 |
Cosmin Badea |
Have a Break from Making Decisions, Have a MARS: The Multi-valued Action Reasoning System |
17.25 |
Session Ends |
|