default search action
8th ICSCA 2019: Penang, Malaysia
- Proceedings of the 8th International Conference on Software and Computer Applications, ICSCA '19, Penang, Malaysia, February 19-21, 2019. ACM 2019, ISBN 978-1-4503-6573-4
High Performance Computing and Intelligent Computing
- Samer Muthana Sarsam, Hosam Al-Samarraie, Bahiyah Omar:
Geo-spatial-based Emotions: A Mechanism for Event Detection in Microblogs. 1-5 - Sandun Rajapaksa, Wageesha Rasanjana, Indika Perera, Dulani Meedeniya:
GPU Accelerated Maximum Likelihood Analysis for Phylogenetic Inference. 6-10 - Samer Muthana Sarsam:
Reinforcing the Decision-making Process in Chemometrics: Feature Selection and Algorithm Optimization. 11-16 - Hussein Hazimeh, Mohammad Harissa, Elena Mugellini, Omar Abou Khaled:
Temporal Sentiment Tracking and Analysis on Large-scale Social Events. 17-21 - Huiyu Han, Xiaoge Li, Shuting Zhi, Haoyue Wang:
Multi-Attention Network for Aspect Sentiment Analysis. 22-26 - Nor'asnilawati Salleh, Siti Sophiayati Yuhaniz, Nurulhuda Firdaus Mohd Azmi, Sharizal Fadlie Sabri:
Enhancing Simplified General Perturbations-4 Model for Orbit Propagation Using Deep Learning: A Review. 27-32 - Hong-Yi Tan, Wun-She Yap, Bok-Min Goi:
Performance Analysis of an Fuzzy Logic Based LEACH Protocol. 33-37 - Chang Su, Hao Li, Xianzhong Xie:
Personalized Ranking Point of Interest Recommendation Based on Spatial-Temporal Distance Metric in LBSNs. 38-43 - Keh-Kim Kee, Simon Boung-Yew Lau:
Cloud-Based IoT Solution for Predictive Modeling of Ship Fuel Consumption. 44-49 - Mohammed A. Al-Sharafi, Ruzaini Abdullah Arshah, Emad A. Abu-Shanab:
Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services. 50-55
Data Engineering and Big Data Technology
- Janelyn A. Talingdan:
Data Mining Using Clustering Algorithm as Tool for Poverty Analysis. 56-59 - Saif Ullah, Muhammad Asif, Shahbaz Ahmad, Ulfat Imdad, Osama Sohaib:
Application of Data Science for Controlling Energy Crises: A Case Study of Pakistan. 60-64 - Maheyzah Md Siraj, Nurul Adibah Rahmat, Mazura Mat Din:
A Survey on Privacy Preserving Data Mining Approaches and Techniques. 65-69 - Asroni, Juanita Yusanti, Slamet Riyadi:
Dashboard-based Alumni Tracer Study Report Using Normalized Data Store Architecture. 70-74 - Yifeng Zheng, Guohe Li, Teng Zhang:
An Improved Over-sampling Algorithm based on iForest and SMOTE. 75-80 - Mallika Kliangkhlao, Somchai Limsiroratana:
Towards the Idea of Agricultural Market Understanding for Automatic Event Detection. 81-86 - Riswan Efendi, Susnaningsih Mu'at, Nelsy Arisandi, Noor Azah Samsudin:
Removing Unclassified Elements in Investigating of Financial Wellbeing Attributes Using Rough-Regression Model. 87-90 - Muhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhamad Azlan Daud:
(In)Security of the AAβ Cryptosystem for Transmitting Large Data. 91-94 - Heru Nugroho, Kridanto Surendro:
Missing Data Problem in Predictive Analytics. 95-100 - Melidiossa V. Pagudpud, Thelma D. Palaoag:
Data Mining the Smartphone Manipulation Skills in a Coffee Farming Community: A Step for Risk Analysis. 101-104 - Shuo Kuai, Yupeng Hu, Xinxiao Zhao, Dong Qin, Wentao Li, Xueqing Li:
A Novel Efficient Query Strategy on Hibernate. 105-108
Algorithm Design and Optimization
- Panpan Wang, Hong Hou, Xiaoqun Guo:
Collaborative Filtering Algorithm Based on User Characteristic and Time Weight. 109-114 - Summia Naz, Muazzam Maqsood, Mehr Yahya Durrani:
An Efficient Algorithm for Recommender System Using Kernel Mapping Techniques. 115-119 - Sinan Q. Salih, AbdulRahman A. Al-Sewari, Zaher Mundher Yaseen:
Pressure Vessel Design Simulation: Implementing of Multi-Swarm Particle Swarm Optimization. 120-124 - Ngo Tung Son, Tran Thi Thuy, Bui Ngoc Anh, Tran Van Dinh:
DCA-Based Algorithm for Cross-Functional Team Selection. 125-129 - Moatsum Alawida, Azman Samsudin, Wafa' Hamdan Alshoura:
Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model. 130-134 - Hammoudeh S. Alamri, Kamal Z. Zamli, Mohd Faizal Ab Razak, Ahmad Firdaus:
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA). 135-139 - Salisu Mamman Abdulrahman, Pavel Brazdil, Wan Mohd Nazmee Wan Zainon, Alhassan Adamu:
Simplifying the Algorithm Selection Using Reduction of Rankings of Classification Algorithms. 140-148 - Eugene Malakhov, Denys Shchelkonogov, Vitaliy Mezhuyev:
Algorithms of Classification of Mass Problems of Production Subject Domains. 149-153 - Xiaoyan Zhang, Jie Bai:
Research on MOOC System Based on Bipartite Graph Context Collaborative Filtering Algorithm. 154-158
Software Design and Development
- Nabil Almashfi, Lunjin Lu, Koby Picker, Christian Maldonado:
Precise String Analysis for JavaScript Programs Using Automata. 159-166 - Alhassan Adamu, Wan Mohd Nazmee Wan Zainon, Salisu Mamman Abdulrahman:
Empirical Investigation of UML Models Matching through Different Weight Calibration. 167-172 - M. Zulfahmi Toh, Shamsul Sahibuddin, Mohd Naz'ri Mahrin:
Adoption Issues in DevOps from the Perspective of Continuous Delivery Pipeline. 173-177 - Nguyen Duc Linh, Phan Duy Hung, Vu Thu Diep, Ta Duc Tung:
Risk Management in Projects Based on Open-Source Software. 178-183 - Sharifah Mashita Syed-Mohamad, Mohd Heikal Husin, Wan Mohd Nazmee Wan Zainon:
Visualizing Test-Defect Coverage Information to Support Analytical Reasoning and Testing. 184-188 - Shin-ya Nishizaki:
ML Polymorphism of Linear Lambda Calculus with First-class Continuations. 189-193 - Mahmoud Mohammad Ahmad Ibrahim, Sharifah Mashita Syed-Mohamad, Mohd Heikal Husin:
Managing Quality Assurance Challenges of DevOps through Analytics. 194-198 - Vitaliy Mezhuyev, Oleg M. Lytvyn, Iuliia Pershyna, Olesia Nechuiviter, Oleg O. Lytvyn, Vladimir Lavrik, Oksana Kovalska, Yurii Gunchenko:
Acceptance of the Methods of Decision-making: A Case Study from Software Development Companies in Ukraine and Malaysia. 199-204 - Amarilis Putri Yanuarifiani, Fang-Fang Chua, Gaik-Yee Chan:
Automating Business Process Model Generation from Ontology-based Requirements. 205-209 - Chunling Hu, Guoqing Geng, Bixin Li, Chao Tang, Xiaofeng Wang:
Verifying Cloud Application for the Interaction Correctness Using SoaML and SPIN. 210-216
Application Development and Application
- Thi Thanh Sang Nguyen:
Model-Based Book Recommender Systems using Naïve Bayes enhanced with Optimal Feature Selection. 217-222 - Seika Tanaka, Hajime Iwata, Junko Shirogane, Yoshiaki Fukazawa:
Development Support of User Interfaces Adaptive to Use Environment. 223-228 - Zafeera Rashid, Chit Su Mon, Raenu Kolandaisamy:
Proposing a Development of Geolocation Mobile Application for Airport Pickup of International Students PickUp. 229-232 - Joel M. Gumiran, Cherry R. Gumiran:
Using a Hypertext Pre-processor Code in Converting .csv File into a Civil Service Commission Daily Time Record Format Applying Agile Model. 233-237 - Mimi Rosnida Osman, Munirah Mohd Yusof, Hanayanti Hafit:
SGApps: Designing and Developing Expert System Apps For Diagnosing Sugar Glider Diseases. 238-242 - Cherry R. Gumiran, Joel M. Gumiran:
Applying Design Science Research in the Development of Human Resource Record Management System with Predictive Analysis through Pointing System. 243-247 - Sim Liew Fong, David Chin Wui Yung, Falah Y. H. Ahmed, Arshad Jamal:
Smart City Bus Application with Quick Response (QR) Code Payment. 248-252 - Aniqa Zaida Khanom, Sheikh Mastura Farzana, Tahsinur Rahman, Iftekharul Mobin:
BookCeption: A Proposed Framework for an Artificially Intelligent Recommendation Platform. 253-257 - Surajit Das Barman, Mahamudul Hasan, Falguni Roy:
A Genre-Based Item-Item Collaborative Filtering: Facing the Cold-Start Problem. 258-262
Image Processing Technology and Application
- Xinni Liu, Fengrong Han, Kamarul Hawari Ghazali, Izzeldin Ibrahim Mohamed, Yue Zhao:
A review of Convolutional Neural Networks in Remote Sensing Image. 263-267 - Hamit Altiparmak, Fatih Veysel Nurçin:
Segmentation of Microscopic Breast Cancer Images for Cancer Detection. 268-271 - Yu-Wei Su, Tzren-Ru Chou:
Analyzing the Color Image of Taiwan Town by Using Data Mining. 272-276 - Poranat Tianual, Amnart Pohthong:
Defects Detection Technique of Use Case Views during Requirements Engineering. 277-281 - Qingdan Huang, Wenxiong Mo, Liqiang Pei, Lian Zeng:
3D Coordinate Calculation and Pose Estimation of Power Meter based on Binocular Stereo Vision. 282-285 - Rose Hafsah Abd. Rauf, Najwa Abd Ghafar, Noor Elaiza Abdul Khalid:
Brain Aneurysm Extraction in MRI Images. 286-290 - Mohammed Al-Habib, Dongjun Huang, Majjed Al-Qatf, Kamal Al-Sabahi:
Cooperative Hierarchical Framework for Group Activity Recognition: From Group Detection to Multi-activity Recognition. 291-298 - Ngo Tung Son, Le Phuong Chi, Phan Truong Lam, Tran Van Dinh:
Combination of Facial Recognition and Interaction with Academic Portal in Automatic Attendance System. 299-305 - Wenbo Luo:
Reconstruct the Back of 3D Face Model Using 2D Gradient Based Interpolation. 306-310 - Yohwan Noh, DoHoon Lee:
Low-Level Human Action Change Detection Using the Motion History Image. 311-314
Computer Theory and Engineering
- Mehreen Khan, Farooque Azam, Muhammad Waseem Anwar, Fatima Samea, Mudassar Adeel Ahmed:
A Model Driven Approach for State Management in Mobile Applications. 315-319 - Mohamad Izani Zainal Abidin, Aishah Abdul Razak:
Modelling of the Prophet Mosque in Virtual Reality. 320-324 - Francisco C. Eugenio Jr., Ardee Joy T. Ocampo:
Assessing Classcraft as an Effective Gamification App based on Behaviorism Learning Theory. 325-329 - Lan Huang, Congcong Yu, Yang Chi, Xiaohui Qi, Hao Xu:
Towards Smart Healthcare Management Based on Knowledge Graph Technology. 330-337 - Chien-Le Goh, Hong Tat Ewe, Yong Kheng Goh:
An Artificial Cell Simulator based on Artificial Chemistry. 338-342 - Roman Dremliuga, Natalia Prisekina:
Artificial Intelligence Legal Policy: Limits of Use of Some Kinds of AI. 343-346 - Masaya Shimakawa, Atsushi Ueno, Shohei Mochizuki, Takashi Tomita, Shigeki Hagihara, Naoki Yonezaki:
Towards Efficient Implementation of Realizability Checking for Reactive System Specifications. 347-352 - Wenxiong Mo, Liqiang Pei, Qingdan Huang, Weijie Liao:
Electric Power Meter Classification Based on BOW. 353-356 - Muhammad Ibnu Choldun Rachmatullah, Judhi Santoso, Kridanto Surendro:
Determining the Neural Network Topology: A Review. 357-362 - Shigeki Hagihara, Masaya Shimakawa, Naoki Yonezaki:
Verification of Verifiability of Voting Protocols by Strand Space Analysis. 363-368 - Ricardo A. Catanghal Jr., Thelma D. Palaoag, Carlwin Dayagdag:
Meta-Analysis of Acoustic Feature Extraction for Machine Listening Systems. 369-372 - Dalton Ndirangu, Waweru Mwangi, Lawrence Nderu:
An Ensemble Filter Feature Selection Method and Outlier Detection Method for Multiclass Classification. 373-379
Modern Information Theory and Technology
- Worawan Marurngsith, Pakorn Weawsawangwong:
Applying Formal Logic Validation to Enhance Natural Language Understanding. 380-384 - Shimpei Ohsugi, Kenji Tanaka, Noboru Koshizuka:
Privacy Enhancement for Delivery Route Optimization through Occupancy Prediction. 385-391 - Mei-Li Shen, Hsiou-Hsiang Liu, Yi-Hsiang Lien, Cheng-Feng Lee, Cheng-Hong Yang:
Hybrid Approach for Forecasting Tourist Arrivals. 392-396 - Chua Shanyu, Lim Chee Chin, Shafriza Nisha Basah, Asrul Fahmi Azizan:
Development of Assessment System for Spine Curvature Angle Measurement. 397-402 - Ying Li, Guohe Li, Yifeng Zheng:
Reservoir Parameter Prediction Using Optimized Seismic Attributes Based on Gamma Test. 403-407 - Tianyang Lan, Hiroki Tomizawa, Hisashi Ichikawa, Akihiro Abe:
Proposal of Method for Analyzing International Students' Tourism Behavior Using a Tourism Support System. 408-413 - Muhammad Alshurideh, Said A. Salloum, Barween Al Kurdi, Mostafa Al-Emran:
Factors affecting the Social Networks Acceptance: An Empirical Study using PLS-SEM Approach. 414-418 - Zhen Wang, Yanling Qian, Long Wang, Shigang Zhang, Xu Luo:
The Extraction of Hidden Fault Diagnostic Knowledge in Equipment Technology Manual Based on Semantic Annotation. 419-424 - Bo Wang, Jun Luo, Shuyuan Zhu:
Research on Domain Ontology Automation Construction Based on Chinese Texts. 425-430
Information Network and Information Security
- Fatima Samea, Farooque Azam, Muhammad Waseem Anwar, Mehreen Khan, Muhammad Rashid:
A UML Profile for Multi-Cloud Service Configuration (UMLPMSC) in Event-driven Serverless Applications. 431-435 - Qiaoqiao Tan, Fangai Liu, Shuning Xing:
Implicit Recommendation with Interest Change and User Influence. 436-441 - Zhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu:
An Information Source Identification Algorithm Based on Shortest Arborescence of Network. 442-446 - Qi Li, Hao Chen:
CDAS: A Continuous Dynamic Authentication System. 447-452 - Huijuan Zhang, Lei Qiao, Dongqing Wang:
A User Attribute Recommendation Algorithm and Peer3D Technology based WebVR P2P Transmission Scheme. 453-456 - Richard M. Marzan, Ariel M. Sison:
An Enhanced Key Security of Playfair Cipher Algorithm. 457-461 - Yue Pan, Jing An, Wenqing Fan, Wei Huang:
Shellfier: A Shellcode Detection Method based on Dynamic Binary Instrumentation and Convolutional Neural Network. 462-466 - Muhammad Umar Aftab, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, Arslan Javed, Xuyun Nie:
Role-Based ABAC Model for Implementing Least Privileges. 467-471 - Tran Quy Ban, Bui Ngoc Anh, Ngo Tung Son, Tran Van Dinh:
Survey of Hyperledger Blockchain Frameworks: Case Study in FPT University's Cryptocurrency Wallets. 472-480 - Shaiful Bakhtiar bin Rodzman, Siti Suhaima binti Suhaili, Normaly Kamal Ismail, Nurazzah Abd Rahman, Syed Ahmad Aljunid, Aslida binti Omar:
Domain Specific Classification of Malay Based Complaints using the Complaint Concept Ontologies. 481-486
Digital Multimedia Technology and Application
- Shuhui Sophy Cheng, Shao-Liang Chang, Chi-Ying Chen:
Problematic Use of Live Video Streaming Services: Impact of Personality Traits, Psychological Factors, and Motivations. 487-490 - Yu Ohno, Hidetake Uwano, Shinji Uchida:
Detection of Random Correction from Source Code Snapshots. 491-495 - Hussein Hazimeh, Elena Mugellini, Omar Abou Khaled:
Reliable User Profile Analytics and Discovery on Social Networks. 496-500 - Farooq Haider, Muhammad Hasanain Chaudary, Muhammad Sajjad Naveed, Muhammad Asif:
IPv6 QoS for Multimedia Applications: A Performance Analysis. 501-504 - Masita Masila Abdul Jalil, Fatihah Mohd, Mustafa Man, Noraida Ali, Suriyani Muhamad:
Social Media Application Usage and Women Entrepreneurship Achievement through E-Business Model: Case of Setiu Wetland. 505-509 - Xiangling Fu, Chenwei Yan, Pengya Zhao:
A Model Integrating Information of Multiple Social Networks. 510-516
Wireless Communication Technology and Internet of Things Applications
- Fan Xiu Ming, Riyaz Ahamed Ariyaluran Habeeb, Fariza Hanum Binti Md Nasaruddin, Abdullah Bin Gani:
Real-Time Carbon Dioxide Monitoring Based on IoT & Cloud Technologies. 517-521 - Saurabh Shukla, Mohd Fadzil Hassan, Low Tang Jung, Azlan Awang, Muhammad Khalid Khan:
A 3-Tier Architecture for Network Latency Reduction in Healthcare Internet-of-Things Using Fog Computing and Machine Learning. 522-528 - Nguyen The Duy, Tran Thi Thuy, Luong Thuy Chung, Ngo Tung Son, Tran Van Dinh:
DC programming and DCA for Secure Guarantee with Null Space Beamforming in Two-Way Relay Networks. 529-532 - Arshad Jamal, Deperkdharrshan Kumar, Rabab Alayham Abbas Helmi, Sim Liew Fong:
Portable TOR Router with Raspberry Pi. 533-537 - Maythem K. Abbas, Low Tang Jung, Raed M. T. Abdulla:
An Automated Software-Agents System for Detecting Road Speed Limit Offences. 538-543 - Fengrong Han, Xinni Liu, Izzeldin Ibrahim Mohamed, Kamarul Hawari Ghazali, Yue Zhao:
A Survey on Deployment and Coverage Strategies in Three-Dimensional Wireless Sensor Networks. 544-549 - Ahmad Alshammari, Mohamed A. Zohdy:
Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov Model. 550-554 - Meng Sun, Kuoyi Shao, Lu Wang:
Minimizing Flow Rules for Rerouting Multi-Flows in Multi-Failure Recovery over SDN. 555-559 - Jinhui Yuan, Hongwei Zhou, Laishun Zhang:
Anomaly Event Detection for Sensor Networks on Apriori Algorithms and Subjective Logic. 560-563 - Tran Thi Thuy, Nguyen Van Nam, Ngo Tung Son, Tran Van Dinh:
DC Programming and DCA for Power Minimization Problem in Multi-User Beamforming Networks. 564-568 - Yee Jian Chew, Shih Yin Ooi, Kok-Seng Wong, Ying-Han Pang:
Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System. 569-573 - Jingxuan He, Jian Zhang, Zeji Hui:
Research on Ultrasonic Positioning Algorithm. 574-578 - Sim Liew Fong, Amir Ariff Azham bin Abu Bakar, Falah Y. H. Ahmed, Arshad Jamal:
Smart Transportation System Using RFID. 579-584
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.