


default search action
8th ICSCA 2019: Penang, Malaysia
- Proceedings of the 8th International Conference on Software and Computer Applications, ICSCA '19, Penang, Malaysia, February 19-21, 2019. ACM 2019, ISBN 978-1-4503-6573-4

High Performance Computing and Intelligent Computing
- Samer Muthana Sarsam, Hosam Al-Samarraie

, Bahiyah Omar:
Geo-spatial-based Emotions: A Mechanism for Event Detection in Microblogs. 1-5 - Sandun Rajapaksa, Wageesha Rasanjana, Indika Perera

, Dulani Meedeniya
:
GPU Accelerated Maximum Likelihood Analysis for Phylogenetic Inference. 6-10 - Samer Muthana Sarsam:

Reinforcing the Decision-making Process in Chemometrics: Feature Selection and Algorithm Optimization. 11-16 - Hussein Hazimeh

, Mohammad Harissa, Elena Mugellini
, Omar Abou Khaled
:
Temporal Sentiment Tracking and Analysis on Large-scale Social Events. 17-21 - Huiyu Han, Xiaoge Li

, Shuting Zhi, Haoyue Wang:
Multi-Attention Network for Aspect Sentiment Analysis. 22-26 - Nor'asnilawati Salleh

, Siti Sophiayati Yuhaniz, Nurulhuda Firdaus Mohd Azmi
, Sharizal Fadlie Sabri:
Enhancing Simplified General Perturbations-4 Model for Orbit Propagation Using Deep Learning: A Review. 27-32 - Hong-Yi Tan, Wun-She Yap, Bok-Min Goi:

Performance Analysis of an Fuzzy Logic Based LEACH Protocol. 33-37 - Chang Su, Hao Li, Xianzhong Xie:

Personalized Ranking Point of Interest Recommendation Based on Spatial-Temporal Distance Metric in LBSNs. 38-43 - Keh-Kim Kee

, Simon Boung-Yew Lau:
Cloud-Based IoT Solution for Predictive Modeling of Ship Fuel Consumption. 44-49 - Mohammed A. Al-Sharafi

, Ruzaini Abdullah Arshah
, Emad A. Abu-Shanab
:
Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services. 50-55
Data Engineering and Big Data Technology
- Janelyn A. Talingdan:

Data Mining Using Clustering Algorithm as Tool for Poverty Analysis. 56-59 - Saif Ullah, Muhammad Asif, Shahbaz Ahmad, Ulfat Imdad, Osama Sohaib

:
Application of Data Science for Controlling Energy Crises: A Case Study of Pakistan. 60-64 - Maheyzah Md Siraj, Nurul Adibah Rahmat, Mazura Mat Din

:
A Survey on Privacy Preserving Data Mining Approaches and Techniques. 65-69 - Asroni

, Juanita Yusanti, Slamet Riyadi:
Dashboard-based Alumni Tracer Study Report Using Normalized Data Store Architecture. 70-74 - Yifeng Zheng, Guohe Li, Teng Zhang:

An Improved Over-sampling Algorithm based on iForest and SMOTE. 75-80 - Mallika Kliangkhlao, Somchai Limsiroratana

:
Towards the Idea of Agricultural Market Understanding for Automatic Event Detection. 81-86 - Riswan Efendi, Susnaningsih Mu'at

, Nelsy Arisandi, Noor Azah Samsudin:
Removing Unclassified Elements in Investigating of Financial Wellbeing Attributes Using Rough-Regression Model. 87-90 - Muhammad Asyraf Asbullah

, Muhammad Rezal Kamel Ariffin, Zahari Mahad
, Muhamad Azlan Daud:
(In)Security of the AAβ Cryptosystem for Transmitting Large Data. 91-94 - Heru Nugroho

, Kridanto Surendro
:
Missing Data Problem in Predictive Analytics. 95-100 - Melidiossa V. Pagudpud

, Thelma D. Palaoag
:
Data Mining the Smartphone Manipulation Skills in a Coffee Farming Community: A Step for Risk Analysis. 101-104 - Shuo Kuai, Yupeng Hu, Xinxiao Zhao, Dong Qin, Wentao Li, Xueqing Li:

A Novel Efficient Query Strategy on Hibernate. 105-108
Algorithm Design and Optimization
- Panpan Wang, Hong Hou, Xiaoqun Guo:

Collaborative Filtering Algorithm Based on User Characteristic and Time Weight. 109-114 - Summia Naz, Muazzam Maqsood

, Mehr Yahya Durrani:
An Efficient Algorithm for Recommender System Using Kernel Mapping Techniques. 115-119 - Sinan Q. Salih

, AbdulRahman A. Al-Sewari
, Zaher Mundher Yaseen:
Pressure Vessel Design Simulation: Implementing of Multi-Swarm Particle Swarm Optimization. 120-124 - Ngo Tung Son

, Tran Thi Thuy, Bui Ngoc Anh
, Tran Van Dinh:
DCA-Based Algorithm for Cross-Functional Team Selection. 125-129 - Moatsum Alawida, Azman Samsudin, Wafa' Hamdan Alshoura:

Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model. 130-134 - Hammoudeh S. Alamri, Kamal Z. Zamli, Mohd Faizal Ab Razak

, Ahmad Firdaus:
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA). 135-139 - Salisu Mamman Abdulrahman

, Pavel Brazdil
, Wan Mohd Nazmee Wan Zainon
, Alhassan Adamu
:
Simplifying the Algorithm Selection Using Reduction of Rankings of Classification Algorithms. 140-148 - Eugene Malakhov

, Denys Shchelkonogov, Vitaliy Mezhuyev
:
Algorithms of Classification of Mass Problems of Production Subject Domains. 149-153 - Xiaoyan Zhang, Jie Bai:

Research on MOOC System Based on Bipartite Graph Context Collaborative Filtering Algorithm. 154-158
Software Design and Development
- Nabil Almashfi, Lunjin Lu, Koby Picker, Christian Maldonado:

Precise String Analysis for JavaScript Programs Using Automata. 159-166 - Alhassan Adamu

, Wan Mohd Nazmee Wan Zainon
, Salisu Mamman Abdulrahman
:
Empirical Investigation of UML Models Matching through Different Weight Calibration. 167-172 - M. Zulfahmi Toh, Shamsul Sahibuddin, Mohd Naz'ri Mahrin:

Adoption Issues in DevOps from the Perspective of Continuous Delivery Pipeline. 173-177 - Nguyen Duc Linh, Phan Duy Hung

, Vu Thu Diep, Ta Duc Tung:
Risk Management in Projects Based on Open-Source Software. 178-183 - Sharifah Mashita Syed-Mohamad

, Mohd Heikal Husin
, Wan Mohd Nazmee Wan Zainon
:
Visualizing Test-Defect Coverage Information to Support Analytical Reasoning and Testing. 184-188 - Shin-ya Nishizaki

:
ML Polymorphism of Linear Lambda Calculus with First-class Continuations. 189-193 - Mahmoud Mohammad Ahmad Ibrahim, Sharifah Mashita Syed-Mohamad

, Mohd Heikal Husin
:
Managing Quality Assurance Challenges of DevOps through Analytics. 194-198 - Vitaliy Mezhuyev

, Oleg M. Lytvyn, Iuliia Pershyna
, Olesia Nechuiviter
, Oleg O. Lytvyn
, Vladimir Lavrik
, Oksana Kovalska
, Yurii Gunchenko:
Acceptance of the Methods of Decision-making: A Case Study from Software Development Companies in Ukraine and Malaysia. 199-204 - Amarilis Putri Yanuarifiani, Fang-Fang Chua, Gaik-Yee Chan:

Automating Business Process Model Generation from Ontology-based Requirements. 205-209 - Chunling Hu, Guoqing Geng

, Bixin Li, Chao Tang, Xiaofeng Wang:
Verifying Cloud Application for the Interaction Correctness Using SoaML and SPIN. 210-216
Application Development and Application
- Thi Thanh Sang Nguyen

:
Model-Based Book Recommender Systems using Naïve Bayes enhanced with Optimal Feature Selection. 217-222 - Seika Tanaka, Hajime Iwata, Junko Shirogane, Yoshiaki Fukazawa:

Development Support of User Interfaces Adaptive to Use Environment. 223-228 - Zafeera Rashid, Chit Su Mon, Raenu Kolandaisamy:

Proposing a Development of Geolocation Mobile Application for Airport Pickup of International Students PickUp. 229-232 - Joel M. Gumiran

, Cherry R. Gumiran
:
Using a Hypertext Pre-processor Code in Converting .csv File into a Civil Service Commission Daily Time Record Format Applying Agile Model. 233-237 - Mimi Rosnida Osman, Munirah Mohd Yusof

, Hanayanti Hafit:
SGApps: Designing and Developing Expert System Apps For Diagnosing Sugar Glider Diseases. 238-242 - Cherry R. Gumiran

, Joel M. Gumiran
:
Applying Design Science Research in the Development of Human Resource Record Management System with Predictive Analysis through Pointing System. 243-247 - Sim Liew Fong, David Chin Wui Yung, Falah Y. H. Ahmed

, Arshad Jamal
:
Smart City Bus Application with Quick Response (QR) Code Payment. 248-252 - Aniqa Zaida Khanom, Sheikh Mastura Farzana, Tahsinur Rahman, Iftekharul Mobin

:
BookCeption: A Proposed Framework for an Artificially Intelligent Recommendation Platform. 253-257 - Surajit Das Barman, Mahamudul Hasan

, Falguni Roy:
A Genre-Based Item-Item Collaborative Filtering: Facing the Cold-Start Problem. 258-262
Image Processing Technology and Application
- Xinni Liu, Fengrong Han, Kamarul Hawari Ghazali

, Izzeldin Ibrahim Mohamed, Yue Zhao:
A review of Convolutional Neural Networks in Remote Sensing Image. 263-267 - Hamit Altiparmak

, Fatih Veysel Nurçin:
Segmentation of Microscopic Breast Cancer Images for Cancer Detection. 268-271 - Yu-Wei Su, Tzren-Ru Chou:

Analyzing the Color Image of Taiwan Town by Using Data Mining. 272-276 - Poranat Tianual, Amnart Pohthong:

Defects Detection Technique of Use Case Views during Requirements Engineering. 277-281 - Qingdan Huang, Wenxiong Mo, Liqiang Pei, Lian Zeng:

3D Coordinate Calculation and Pose Estimation of Power Meter based on Binocular Stereo Vision. 282-285 - Rose Hafsah Abd. Rauf, Najwa Abd Ghafar, Noor Elaiza Abdul Khalid:

Brain Aneurysm Extraction in MRI Images. 286-290 - Mohammed Al-Habib

, Dongjun Huang, Majjed Al-Qatf
, Kamal Al-Sabahi
:
Cooperative Hierarchical Framework for Group Activity Recognition: From Group Detection to Multi-activity Recognition. 291-298 - Ngo Tung Son

, Le Phuong Chi, Phan Truong Lam, Tran Van Dinh:
Combination of Facial Recognition and Interaction with Academic Portal in Automatic Attendance System. 299-305 - Wenbo Luo:

Reconstruct the Back of 3D Face Model Using 2D Gradient Based Interpolation. 306-310 - Yohwan Noh, DoHoon Lee:

Low-Level Human Action Change Detection Using the Motion History Image. 311-314
Computer Theory and Engineering
- Mehreen Khan, Farooque Azam

, Muhammad Waseem Anwar
, Fatima Samea, Mudassar Adeel Ahmed:
A Model Driven Approach for State Management in Mobile Applications. 315-319 - Mohamad Izani Zainal Abidin, Aishah Abdul Razak:

Modelling of the Prophet Mosque in Virtual Reality. 320-324 - Francisco C. Eugenio Jr., Ardee Joy T. Ocampo

:
Assessing Classcraft as an Effective Gamification App based on Behaviorism Learning Theory. 325-329 - Lan Huang, Congcong Yu, Yang Chi, Xiaohui Qi, Hao Xu:

Towards Smart Healthcare Management Based on Knowledge Graph Technology. 330-337 - Chien-Le Goh, Hong Tat Ewe, Yong Kheng Goh

:
An Artificial Cell Simulator based on Artificial Chemistry. 338-342 - Roman Dremliuga

, Natalia Prisekina:
Artificial Intelligence Legal Policy: Limits of Use of Some Kinds of AI. 343-346 - Masaya Shimakawa, Atsushi Ueno, Shohei Mochizuki, Takashi Tomita

, Shigeki Hagihara, Naoki Yonezaki:
Towards Efficient Implementation of Realizability Checking for Reactive System Specifications. 347-352 - Wenxiong Mo, Liqiang Pei, Qingdan Huang, Weijie Liao:

Electric Power Meter Classification Based on BOW. 353-356 - Muhammad Ibnu Choldun Rachmatullah, Judhi Santoso, Kridanto Surendro

:
Determining the Neural Network Topology: A Review. 357-362 - Shigeki Hagihara, Masaya Shimakawa, Naoki Yonezaki:

Verification of Verifiability of Voting Protocols by Strand Space Analysis. 363-368 - Ricardo A. Catanghal Jr.

, Thelma D. Palaoag
, Carlwin Dayagdag:
Meta-Analysis of Acoustic Feature Extraction for Machine Listening Systems. 369-372 - Dalton Ndirangu, Waweru Mwangi, Lawrence Nderu:

An Ensemble Filter Feature Selection Method and Outlier Detection Method for Multiclass Classification. 373-379
Modern Information Theory and Technology
- Worawan Marurngsith, Pakorn Weawsawangwong:

Applying Formal Logic Validation to Enhance Natural Language Understanding. 380-384 - Shimpei Ohsugi, Kenji Tanaka

, Noboru Koshizuka:
Privacy Enhancement for Delivery Route Optimization through Occupancy Prediction. 385-391 - Mei-Li Shen, Hsiou-Hsiang Liu, Yi-Hsiang Lien, Cheng-Feng Lee, Cheng-Hong Yang:

Hybrid Approach for Forecasting Tourist Arrivals. 392-396 - Chua Shanyu, Lim Chee Chin

, Shafriza Nisha Basah
, Asrul Fahmi Azizan:
Development of Assessment System for Spine Curvature Angle Measurement. 397-402 - Ying Li, Guohe Li, Yifeng Zheng:

Reservoir Parameter Prediction Using Optimized Seismic Attributes Based on Gamma Test. 403-407 - Tianyang Lan, Hiroki Tomizawa, Hisashi Ichikawa, Akihiro Abe:

Proposal of Method for Analyzing International Students' Tourism Behavior Using a Tourism Support System. 408-413 - Muhammad Alshurideh

, Said A. Salloum, Barween Al Kurdi
, Mostafa Al-Emran
:
Factors affecting the Social Networks Acceptance: An Empirical Study using PLS-SEM Approach. 414-418 - Zhen Wang, Yanling Qian, Long Wang, Shigang Zhang, Xu Luo

:
The Extraction of Hidden Fault Diagnostic Knowledge in Equipment Technology Manual Based on Semantic Annotation. 419-424 - Bo Wang, Jun Luo, Shuyuan Zhu:

Research on Domain Ontology Automation Construction Based on Chinese Texts. 425-430
Information Network and Information Security
- Fatima Samea, Farooque Azam

, Muhammad Waseem Anwar
, Mehreen Khan, Muhammad Rashid
:
A UML Profile for Multi-Cloud Service Configuration (UMLPMSC) in Event-driven Serverless Applications. 431-435 - Qiaoqiao Tan, Fangai Liu, Shuning Xing:

Implicit Recommendation with Interest Change and User Influence. 436-441 - Zhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu:

An Information Source Identification Algorithm Based on Shortest Arborescence of Network. 442-446 - Qi Li, Hao Chen:

CDAS: A Continuous Dynamic Authentication System. 447-452 - Huijuan Zhang, Lei Qiao, Dongqing Wang:

A User Attribute Recommendation Algorithm and Peer3D Technology based WebVR P2P Transmission Scheme. 453-456 - Richard M. Marzan

, Ariel M. Sison:
An Enhanced Key Security of Playfair Cipher Algorithm. 457-461 - Yue Pan, Jing An, Wenqing Fan, Wei Huang:

Shellfier: A Shellcode Detection Method based on Dynamic Binary Instrumentation and Convolutional Neural Network. 462-466 - Muhammad Umar Aftab

, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, Arslan Javed, Xuyun Nie:
Role-Based ABAC Model for Implementing Least Privileges. 467-471 - Tran Quy Ban

, Bui Ngoc Anh
, Ngo Tung Son
, Tran Van Dinh
:
Survey of Hyperledger Blockchain Frameworks: Case Study in FPT University's Cryptocurrency Wallets. 472-480 - Shaiful Bakhtiar bin Rodzman

, Siti Suhaima binti Suhaili, Normaly Kamal Ismail, Nurazzah Abd Rahman, Syed Ahmad Aljunid, Aslida binti Omar:
Domain Specific Classification of Malay Based Complaints using the Complaint Concept Ontologies. 481-486
Digital Multimedia Technology and Application
- Shuhui Sophy Cheng, Shao-Liang Chang, Chi-Ying Chen:

Problematic Use of Live Video Streaming Services: Impact of Personality Traits, Psychological Factors, and Motivations. 487-490 - Yu Ohno, Hidetake Uwano

, Shinji Uchida:
Detection of Random Correction from Source Code Snapshots. 491-495 - Hussein Hazimeh, Elena Mugellini

, Omar Abou Khaled
:
Reliable User Profile Analytics and Discovery on Social Networks. 496-500 - Farooq Haider, Muhammad Hasanain Chaudary, Muhammad Sajjad Naveed, Muhammad Asif:

IPv6 QoS for Multimedia Applications: A Performance Analysis. 501-504 - Masita Masila Abdul Jalil

, Fatihah Mohd, Mustafa Man
, Noraida Ali
, Suriyani Muhamad
:
Social Media Application Usage and Women Entrepreneurship Achievement through E-Business Model: Case of Setiu Wetland. 505-509 - Xiangling Fu, Chenwei Yan

, Pengya Zhao:
A Model Integrating Information of Multiple Social Networks. 510-516
Wireless Communication Technology and Internet of Things Applications
- Fan Xiu Ming, Riyaz Ahamed Ariyaluran Habeeb

, Fariza Hanum Binti Md Nasaruddin
, Abdullah Bin Gani
:
Real-Time Carbon Dioxide Monitoring Based on IoT & Cloud Technologies. 517-521 - Saurabh Shukla

, Mohd Fadzil Hassan
, Low Tang Jung, Azlan Awang, Muhammad Khalid Khan:
A 3-Tier Architecture for Network Latency Reduction in Healthcare Internet-of-Things Using Fog Computing and Machine Learning. 522-528 - Nguyen The Duy, Tran Thi Thuy, Luong Thuy Chung, Ngo Tung Son

, Tran Van Dinh:
DC programming and DCA for Secure Guarantee with Null Space Beamforming in Two-Way Relay Networks. 529-532 - Arshad Jamal

, Deperkdharrshan Kumar, Rabab Alayham Abbas Helmi
, Sim Liew Fong:
Portable TOR Router with Raspberry Pi. 533-537 - Maythem K. Abbas

, Low Tang Jung, Raed M. T. Abdulla
:
An Automated Software-Agents System for Detecting Road Speed Limit Offences. 538-543 - Fengrong Han, Xinni Liu, Izzeldin Ibrahim Mohamed, Kamarul Hawari Ghazali

, Yue Zhao:
A Survey on Deployment and Coverage Strategies in Three-Dimensional Wireless Sensor Networks. 544-549 - Ahmad Alshammari

, Mohamed A. Zohdy:
Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov Model. 550-554 - Meng Sun, Kuoyi Shao, Lu Wang:

Minimizing Flow Rules for Rerouting Multi-Flows in Multi-Failure Recovery over SDN. 555-559 - Jinhui Yuan, Hongwei Zhou, Laishun Zhang:

Anomaly Event Detection for Sensor Networks on Apriori Algorithms and Subjective Logic. 560-563 - Tran Thi Thuy, Nguyen Van Nam, Ngo Tung Son

, Tran Van Dinh:
DC Programming and DCA for Power Minimization Problem in Multi-User Beamforming Networks. 564-568 - Yee Jian Chew

, Shih Yin Ooi, Kok-Seng Wong
, Ying-Han Pang
:
Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System. 569-573 - Jingxuan He

, Jian Zhang, Zeji Hui:
Research on Ultrasonic Positioning Algorithm. 574-578 - Sim Liew Fong, Amir Ariff Azham bin Abu Bakar, Falah Y. H. Ahmed

, Arshad Jamal
:
Smart Transportation System Using RFID. 579-584

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














