default search action
9th ICSCA 2020: Langkawi, Malaysia
- Proceedings of the 9th International Conference on Software and Computer Applications, ICSCA 2020, Langkawi, Malaysia, February 18-21, 2020. ACM 2020, ISBN 978-1-4503-7665-5
Soft Computing and Methods
- Tianyou Yang, Yingjie Shi, Haiqiao Huang:
CLDM: A Clothing Landmark Detector Based on Mask R-CNN. 1-5 - Erna Hikmawati, Kridanto Surendro:
How to Determine Minimum Support in Association Rule. 6-10 - Ruiyun Zhu, Jingcheng Shen, Xiangtian Deng, Marcus Wallden, Fumihiko Ino:
Training Strategies for CNN-based Models to Parse Complex Floor Plans. 11-16 - Masaya Shimakawa, Kentaro Hayashi, Shigeki Hagihara, Naoki Yonezaki:
Towards Interpretation of Abstract Instructions Using Declarative Constraints in Temporal Logic. 17-20 - Thang V. Nguyen, Nam T. H. Nguyen, Triet Le, Sang T. T. Nguyen, Lam Huynh:
Estimation of Heat of Formation for Chemical Systems using the Lasso Regression-Based Approach. 21-25 - Anam Habib, Nosheen Jelani, Asad Masood Khattak, Saima Akbar, Muhammad Zubair Asghar:
Exploiting Deep Neural Networks for Intention Mining. 26-30
Data Analysis and Processing
- Gangani Ariyarathne, Senuri De Silva, Sanuwani Dayarathna, Dulani Meedeniya, Sampath Jayarathna:
ADHD Identification using Convolutional Neural Network with Seed-based Approach for fMRI Data. 31-35 - Heru Nugroho, Nugraha Priya Utama, Kridanto Surendro:
Performance Evaluation for Class Center-Based Missing Data Imputation Algorithm. 36-40 - Raphael Hartner, Vitaliy Mezhuyev, Martin Tschandl, Christian Bischof:
Digital Shop Floor Management: A Practical Framework For Implementation. 41-45 - Heru Nugroho, Nugraha Priya Utama, Kridanto Surendro:
Comparison Method for Handling Missing Data in Clinical Studies. 46-50 - Mageshwari Valachamy, Shamsul Sahibuddin, Noor Azurati Ahmad, Nur Azaliah Abu Bakar:
Geospatial Data Sharing: Preliminary Studies on Issues and Challenges in Natural Disaster Management. 51-56 - Heru Nugroho, Soni Fajar Surya Gumilang:
Recommendations for Improving Data Management Process in Government of Bandung Regency using COBIT 4.1 Framework. 57-61
Algorithm Modeling and Optimization
- Md. Abdul Kader, Kamal Z. Zamli:
Adopting Jaya Algorithm for Team Formation Problem. 62-66 - Rabah Mazouzi, Philippe Harel:
A Hybrid "Quantum and Classical" Method for Outlier Detection. 67-73 - Tuyen Phong Truong, Toan Hai Le:
A Distributed Directed Breadth-First Search Algorithm Based on Message-Passing Model for Efficient Line-of-Sight Computation. 74-78 - Md. Abdul Kader, Jamal A. Jamaluddin, Kamal Z. Zamli:
An Educational Tool Aimed at Learning Metaheuristics. 79-83 - Yi Zhou, Shanru Li, Chongwen Wang:
Research on Product Detection Algorithm for Intelligent Refrigerator. 84-88 - Rui Sun, Yuqiang Li:
Applying Prefixed-Itemset and Compression Matrix to Optimize the MapReduce-based Apriori Algorithm on Hadoop. 89-93 - Muhammad Zubair Rehman, Kamal Z. Zamli, Abdullah B. Nasser:
An Improved Genetic Bat algorithm for Unconstrained Global Optimization Problems. 94-98 - Muhammad Nur Fikri Hishamuddin, Mohd Fadzil Hassan, Ainul Akmar Mokhtar:
Improving Classification Accuracy of Random Forest Algorithm Using Unsupervised Discretization with Fuzzy Partition and Fuzzy Set Intervals. 99-104 - Abdullah B. Nasser, Antar Shaddad Abdul-Qawy, Nibras Abdullah, Fadhl Hujainah, Kamal Z. Zamli, Waheed Ali H. M. Ghanem:
Latin Hypercube Sampling Jaya Algorithm based Strategy for T-way Test Suite Generation. 105-109
Image Processing
- Samarth Gupta:
Real Time Face Recognition on an Edge Computing Device. 110-113 - Xin-Yi Peng, Jun Cao, Fuyuan Zhang:
Masked Face Detection Based on Locally Nonlinear Feature Fusion. 114-118 - Oluyinka Iyabo Omotosho, Yetunde Akinwale, Adedoyin Idris:
Semantic Based Vitamin Deficiency Monitoring System. 119-123 - Risako Aoki, Takuro Oki, Ryusuke Miyamoto:
Accuracy Improvement of Human Tracking in Aerial Images Using Error Correction Based on Color Information. 124-128 - Le Dinh Duy, Ngo Tuan Anh, Ngo Tung Son, Nguyen Viet Tung, Nguyen Ba Duong, Muhammad Hassan Raza Khan:
Deep Learning in Semantic Segmentation of Rust in Images. 129-132 - Guoying Liu, Jici Xing, Jing Xiong:
Spatial Pyramid Block for Oracle Bone Inscription Detection. 133-140 - Ziyao Wang, Dali Yang, Qiang Tong:
A Method of Workpiece Coherent Line Detection Based on Progressive Probabilistic Hough Transform. 141-146
Software Design and Program Development
- Rimsha Khan, Farooque Azam, Bilal Maqbool, Muhammad Waseem Anwar:
A Framework for Automated Reengineering of BPMN Models by Excluding Inefficient Activities. 147-151 - Hamza Ghandorh, Abdulfattah Noorwali, Ali Bou Nassif, Luiz Fernando Capretz, Roy Eagleson:
A Systematic Literature Review for Software Portability Measurement: Preliminary Results. 152-157 - Shahida Sulaiman, Siti Julia Mohd Shahrol, Abd Rahman Abd Samad:
Service Learning in Application Development Course: A Case Study of a Rural Community Engagement. 158-162 - Kaito Yoshino, Saeko Matsuura:
Requirements Traceability Management Support Tool for UML Models. 163-166 - Tamim Al Mahmud, Md Gulzar Hussain, Sumaiya Kabir, Hasnain Ahmad, Mahmudus Sobhan:
A Keyword Based Technique to Evaluate Broad Question Answer Script. 167-171 - Nualsawat Hiransakolwong:
EQ101: Emotional Quotient Assessment A Mobile Application for Students. 172-176
Software Testing and Quality Assessment
- Huanyu Wu:
A Systematical Study for Deep Learning Based Android Malware Detection. 177-182 - Syed Husnain Kazmi, Farooque Azam, Muhammad Waseem Anwar, Bilal Maqbool:
A Meta-Model for Automated Black-Box Testing of Visualization Based Software Applications. 183-187 - Qian Wang, Wei Zhang, Jianhui Jiang, Long Li:
A Reliability Automatic Assessment Framework of Open Source Software Based on JIRA. 188-193 - Ahmad Naim Irfan, Aswami Ariffin, Mohd Naz'ri Mahrin, Syahid Anuar:
A Malware Detection Framework Based on Forensic and Unsupervised Machine Learning Methodologies. 194-200 - Muhammad Sohaib Munir, Hafsa Tanveer, Urooj Fatima:
Mixed Initiative Realizability Problem Resolution Using UML Composite States. 201-205 - Lin Zhang, Ning Li, Xia Hou, Yingai Tian:
Automated Office Software Test Method. 206-211 - Hanseong Lee, Hyung-Woo Lee:
New Approach on Steganalysis: Reverse-Engineering based Steganography SW Analysis. 212-216
Data Communication and Information System
- Changsong Ma, Hongwei Rong, Yushu Liu:
Design of Cultural Relics Protection Micro-environment Monitoring System Based on ZigBee Wireless Communication. 217-221 - Naveen Kumar Gupta, Rama Shankar Yadav, Rajendra Kumar Nagaria:
Anchor Based Geographical Routing in WSN. 222-226 - Noriaki Yoshiura, Keigo Sugiyama:
Packet Reachability Verification in OpenFlow Networks. 227-231 - Ekkachan Rattanalerdnusorn, Montida Pattaranantakul, Phithak Thaenkaew, Chalee Vorakulpipat:
IoTDePT: Detecting Security Threats and Pinpointing Anomalies in an IoT environment. 232-236 - Zukun Lu, Feiqiang Chen, Honglei Lin, Yifan Sun, Yuchen Xie:
A Novel Method of Distortionless Correlation Function after STAP for BOC. 237-241 - Noriaki Yoshiura, Kento Koizumi:
A Method of Collecting the IP Addresses of Hidden Server in Tor Networks. 242-246 - Kim-Mey Chew, Syvester Chiang-Wei Tan, Gary Chee-Wyai Loh, Nancy Bundan, Siew-Ping Yiiong:
IoT Soil Moisture Monitoring and Irrigation System Development. 247-252 - Tuyen Phong Truong, Toan Hai Le:
Modeling and Simulating Concurrent Communications of Distributed Sensing Networks. 253-257
Computer Science and Information Technology
- Ma Chi:
Backward Slicing Analysis on Debug Log for Crash Comprehension. 258-263 - Abdullahi Abubakar Kawu, Abdulkarim Abdullahi, Elijah Joseph, Amit Mishra, Abdulganiyu Abdulrahman:
MIRCS: A Mobile USSD-SMS Interactive Result Checking System for Resource-Constrained Settings. 264-268 - Chengcheng Peng, Bin Wu, Zekun Li:
BGSGA: Combining Bi-GRU and Syntactic Graph Attention for Improving Distant Supervision Relation Extraction. 269-275 - Wong Keng Tuck, Chien-Le Goh, Ng Hu:
A False Negative Cost Minimization Ensemble Methods for Customer Churn Analysis. 276-280 - Hireche Samia, Dennai Abdeslem:
A Review of Artificial Intelligence Techniques used for Urban Automatic Incident Detection Systems. 281-286 - Ihor Lubashevsky, Akihito Usui, Kaito Morimura:
Non-Stationary Car-Following Dynamics: Driving Simulator Experiments. 287-291 - Tiangang Bai, Hongxu Hou, Yatu Ji:
Sub-word Embedding Auxiliary Encoding in Mongolian-Chinese Neural Machine Translation. 292-296 - Long Xia, Sun Chunxia, Tan Ming:
Design and Implementation of Intelligent Ear Tag for Dairy Cows in Farms. 297-301 - Xinwei Zhang, Jin Wang, Yuxiao Zhang, Guodong Lu:
Responsive Motif Exploration Using Symmetry Dependency Syntax. 302-306 - Fathima Shanaz, Roshan G. Ragel:
Wikidata based Location Entity Linking. 307-312 - Hernan M. Palombo, Egor Dolzhenko, Jay Ligatti, Hao Zheng:
Stream-Monitoring Automata. 313-320 - Uwe Brunner, Christoph Hechtl, Vitaliy Mezhuyev:
Development of a Parameterizable Process-Oriented Model for Freight Cost Estimation. 321-325
Information and Data Security
- Jing Huey Khor, Mansur Aliyu Masama, Michail Sidorov, WeiChung Leong, JiaJun Lim:
An Improved Gas Efficient Library for Securing IoT Smart Contracts Against Arithmetic Vulnerabilities. 326-330 - Danielle Ferguson, Yan Albright, Daniel Lomsak, Tyler Hanks, Kevin Orr, Jay Ligatti:
PoCo: A Language for Specifying Obligation-Based Policy Compositions. 331-338 - Shumaila Qamar, Wasi Haider Butt, Muhammad Waseem Anwar, Farooque Azam, Muhammad Qasim Khan:
A Comprehensive Investigation of Universal Verification Methodology (UVM) Standard for Design Verification. 339-343 - Kuo Zuo, Ning Li, Yingai Tian, Xia Hou:
Design of An Automated Testing Tool for Typesetting of Reflowable Documents. 344-350 - Ahmed Iqbal Pritom, Mehrab Zaman Chowdhury, Joy Protim, Shanto Roy, Md. Rashedur Rahman, Sadia Mehnaz Promi:
Combining Movement Model with Finger-Stroke Level Model Towards Designing a Security Enhancing Mobile Friendly CAPTCHA. 351-356 - Koji Ishii, Shin-ya Nishizaki:
Static Code Analysis Using Refinement Types based on Design by Contract. 357-363 - Aman Kumar Singh, Raj K. Jaiswal:
DDoSify: Server Workload Migration During DDOS Attack In NFV. 364-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.