


default search action
16th SoMeT 2017: Kitakyushu City, Japan
- Hamido Fujita, Ali Selamat, Sigeru Omatu:

New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 16th International Conference, SoMeT_17, Kitakyushu City, Japan, September 26-28, 2017. Frontiers in Artificial Intelligence and Applications 297, IOS Press 2017, ISBN 978-1-61499-799-3 - Volker Gruhn, Stefan Gries, Marc Hesenius

, Julius Ollesch, Shafiq-Ur Rehman, Nils Schwenzfeier, Christian Wahl, Florian Wessling:
Engineering Cyber-Physical Systems. 3-18
Chapter 1. Intelligent Software Systems Design, and Software Evolution Techniques
- Hien D. Nguyen

, Nhon V. Do:
Intelligent Problem Solver in Education for Discrete Mathematics. 21-34 - Nhon V. Do, Thanh T. Mai:

Perfect COKB Model and Reasoning Methods for the Design of Intelligent Problem Solvers. 35-50 - Bao Ngoc Trinh, Huynh Quyet Thang

, Thuy-Linh Nguyen:
Research on Genetic Algorithm and Nash Equilibrium in Multi-Round Procurement. 51-64 - Masaru Teranishi, Shinpei Matsumoto, Hidetoshi Takeno:

Flat Finishing Skill Training Software System Based on Personal Peculiarity Classification. 65-72 - Rebwar M. Nabi

, Rania Azad
, Rebaz M. Nabi, Sardasht M.-Raouf Mahmood:
Online Handwritten Signatures Verificaton Using Dynamic Threshold Combined with Local and Global Features. 73-87 - Zalán Bodó

, Bipin Indurkhya
:
Software Categorization Using Low-Level Distributional Features. 88-98 - Juan Bernabé-Moreno, Álvaro Tejeda-Lorente

, Carlos Porcel, Enrique Herrera-Viedma:
A Holistic Domain Knowledge Discovery and Recommendation System for Collaborative Wikis. 99-114
Chapter 2. Artificial Intelligence Techniques on Software Engineering, and Requirement Engineering
- Muhammad Arif Mohamad

, Habibollah Haron
, Haswadi Hassan:
Flower Pollination Freeman Chain Code (FP-FCC) Extraction Algorithm for Handwritten Character Recognition. 117-123 - Hidekazu Yanagimoto

:
Support Vector Machines with Neural Network. 124-138 - Aniello Minutolo, Massimo Esposito

, Giuseppe De Pietro:
A Conversational Chatbot Based on Kowledge-Graphs for Factoid Medical Questions. 139-152 - Shafiq-Ur Rehman, Volker Gruhn:

Security Requirements Engineering (SRE) Framework for Cyber-Physical Systems (CPS): SRE for CPS. 153-163 - Sa'adah Hassan, Azrina Kamaruddin

, Novia Admodisastro
, Marzanah A. Jabar:
Towards Developing an Approach to Confluence Innovative in Requirements Engineering. 164-175 - Raquel Ureña

, Francisco Chiclana
, Hamido Fujita
, Enrique Herrera-Viedma:
Confidence Based Consensus in Environments with High Uncertainty and Incomplete Information. 176-189 - Anna Maria Di Sciullo:

Asymmetry Based Parsing and Semantic Compositionality. 190-203 - Daniel Cortés, Mariko Nakano, Hisashi Koga, Héctor Pérez:

Evaluation of Image Descriptors for Urban-Rural Classification of Aerial Images. 204-213
Chapter 3. Medical Informatics and Bioinformatics, Software Methods and Application for Biomedicine and Bioinformatics
- Lukas Peter, Martina Ladrova

, Iveta Bryjova, Martin Cerný
:
Analysis of Heart Rate Variability from Multichannel Photoplethysmography. 217-225 - Eisaku Ohta, Mikito Ogino, Yasue Mitsukura:

Relation Extraction for Circadian Rhythm Using the EEG. 226-232 - Cin-Han Yang, Tun-Wen Pai, Ron-Shan Chen, Hsin-Yiu Chou:

Data Based Feature Identification of Polymorphic Functional Marker from Transcriptome Comparison. 233-241 - Jan Kubícek, Veronika Vicianova, Marek Penhaker

, Martin Augustynek
:
Time Deformable Segmentation Model Based on the Active Contour Driven by Gaussian Energy Distribution: Extraction and Modeling of Early Articular Cartilage Pathological Interuptions. 242-255 - Jan Kubícek, Marek Penhaker

, Tomas Ondraczka, Zdenek Machacek
, Martin Cerný
, Martin Augustynek
, Petra Maresová:
Automated Extraction and Modeling of Calcifications and Blood Stream Volumetric Parameters. 256-269 - Jan Kubícek, Jana Kosturikova, Marek Penhaker

, Martin Augustynek
, Kamil Kuca:
Segmentation Based on Gabor Transformation with Machine Learning: Modeling of Retinal Blood Vessels System from RetCam Images and Tortuosity Extraction. 270-283 - José Antonio Moral-Muñoz

, Adan Toscano, Manuel J. Cobo
, Ignacio J. Pérez
:
mBalance: An Intelligent Android Application to Assess and Analyze Body Balance. 284-297 - Norhaslinda Kamaruddin

, Dini Handayani, Abdul Wahab:
Computational Visualization of Customer Mood Using Affective Space Model Approach. 298-311 - Peter Piros, Rita Fleiner, Tamas Ferenci, Péter Andréka, Hamido Fujita

, Peter J. Oefner, Levente Kovács, András Jánosi:
An Overview of Myocardial Infarction Registries and Results from the Hungarian Myocardial Infarction Registry. 312-320 - Hamido Fujita

, U. Raghavendra, Anjan Gudigar, Vinoy Vishnu Vadakkepat, U. Rajendra Acharya
:
Automated Characterization of Breast Cancer Using Steerable Filters. 321-327
Chapter 4. Commercial Business Oriented Software Application Models and Emergency Disaster Recovery Software Systems
- Shuang Li, Shizune Takahashi, Keizo Yamada, Masanori Takagi, Jun Sasaki:

A Proposal of the Tourism Course Recommendation System (TCRS) for Foreign Tourists by Using Photo Data in Social Network Service. 331-338 - Shizune Takahashi, Shuang Li, Keizo Yamada, Masanori Takagi, Jun Sasaki:

Case Study of Tourism Course Recommendation System Using Data from Social Network Services. 339-347 - Chi-Yo Huang, Jeng-Chieh Cheng:

A Derivation of Factors Influencing the Concept Development of Virtual Reality Products by Hybrid MADM Methods. 348-361 - Ummu Hani' Hair Zaki

, Roliana Ibrahim, Shahliza Abd Halim, Takeru Yokoi
:
A Review on Service Oriented Architecture Approach in Flood Disaster Management Framework for Sentiment Analysis: Malaysia Context. 362-377 - Kyosuke Takahashi

, Hitoshi Inomo, Wataru Shiraki, Shiho Okamoto:
Behavior Support for Residents During Typhoon Based on Association Rule Mining. 378-384 - Fatai Idowu Sadiq, Ali Selamat, Roliana Ibrahim, Md. Hafiz Selamat, Ondrej Krejcar

:
Stampede Prediction Based on Individual Activity Recognition for Context-Aware Framework Using Sensor-Fusion in a Crowd Scenarios. 385-396
Chapter 5. Software Engineering Models, Methodologies, Tools, Designs and Techniques
- Stefan Gries, Marc Hesenius

, Volker Gruhn:
Tracing Cascading Data Corruption in CPS with the Information Flow Monitor. 399-408 - Fumio Narisawa, Yoshikazu Ueda:

Safety Verification Method for Priority-Based Real-Time Software. 409-424 - Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, Faouzi Moussa:

Wr2Fdr Tool Maintenance for Models Checking. 425-440 - Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Emil Pricop

, Ouejdene Samoud:
Introduction to SinJAR (a New Tool for Reverse Engineering Java Applications) and Tracing Its Malicious Actions Using Hidden Markov Models. 441-453 - David Fernández-Amorós

, Ruben Heradio
, Carlos Cerrada, Enrique Herrera-Viedma, Manuel J. Cobo
:
Towards Taming Variability Models in the Wild. 454-465 - Wael Chargui, Taoufik Sakka Rouis, Mourad Kmimech, Mohamed Tahar Bhiri, Layth Sliman

, Badran Raddaoui:
Towards a Formal Verification Approach for Service Component Architecture. 466-479 - Vincent von Hof:

Leveraging Test Case Generation in the Testing Process - An Integration of Human Oracles with Derived Oracles. 480-489 - Amal Ayach, Layth Sliman

, Mourad Kmimech, Mohamed Tahar Bhiri, Badran Raddaoui:
Towards a Formal Verification Approach for Cloud Software Architecture. 490-502 - Mario Sotelo-Garrido, Mariko Nakano-Miyatake, Gabriel Sanchez-Perez

, Manuel Cedillo-Hernandez, Héctor Pérez-Meana:
Software Protection Against Illegal Copy Using Software Watermarking. 503-511 - Lifang Dai, Jian Wu

, Francisco Chiclana
, Hamido Fujita
, Enrique Herrera-Viedma:
An Interaction Consensus in Group Decision Making Under Distributed Linguistic Trust Information. 512-524 - Andres Hernandez-Matamoros

, Takayuki Nagai, Muhammad Attamimi
, Mariko Nakano, Héctor Pérez-Meana:
Facial Expression Recogntion in Unconstrained Environment. 525-538 - Sigeru Omatu:

Estimation of Rice Area from Satellite Data Using Neural Networks. 539-549 - Mostafa Ahmed Alksher, Azreen Azman, Razali Yaakob, Rabiah Abdul Kadir

, Abdulmajid Mohamed, Eissa Alshari
:
A Framework for Idea Mining Evaluation. 550-559
Chapter 6. Trends and Practices in Software Engineering Disciplines
- Absalom Shu, Konstantin Markov, Alexander Vazhenin, Ruth Cortez, Subhash Bhalla

, Shashank Shrestha
:
Unified User-Interface and Protocol for Managing Heterogeneous Deep Learning Services. 563-575 - Alexander Vazhenin, Anna Mikheeva

, Petr Dyadkov, Andrey Marchuk:
The Software Using Digital Databases and GIS Interface for Detecting Geodynamic Structures. 576-592 - Anusuyah Subbarao

, Mohd Naz'ri Mahrin:
Formulating Evaluation Model to Assess the Effectiveness of Coordination Processes in Global Software Development Projects. 593-603 - Marco Pota, Massimo Esposito

, Giuseppe De Pietro:
Convolutional Neural Networks for Question Classification in Italian Language. 604-615 - Roberto Chiarvetto, Guido Guizzi, Enrique Kremers, Elpidio Romano

, Lorenzo Damiani, Roberto Revetria, Pietro Giribone:
An Innovative Approach for Rolling Mill and Forge Scheduling Based on Modified COTS Algorithms. 616-627 - Chi-Yo Huang, Hsueh-Hsin Lu, Wen-Hsin Tseng, Meng-Ru Li, Wan-Jung Chang, Yun-Hsuan Yang, Yi-Chia Wu, Ming-Jen Yang, Ming-Jenn Wu:

The Changeable Space Theories Based Capacity Configuration for TFT-LCD Fabs. 628-640 - Nurulhuda Zainuddin, Ali Selamat, Roliana Ibrahim:

Twitter Hate Aspect Extraction Using Association Analysis and Dictionary-Based Approach. 641-651 - Masafumi Nakano, Akihiko Takahashi, Soichiro Takahashi:

Robust Technical Trading with Fuzzy Knowledge-Based Systems. 652-667 - Guido Guizzi, Elpidio Romano

, Lorenzo Damiani, Pietro Giribone, Roberto Revetria, Matteo Toma:
An Ontology Based Model for the Optimization of the Shutters Cutting Stock for Compressor Valves. 668-677 - László Horváth, Imre J. Rudas:

Driving Engineering Model Generation on Functional and Logical Levels. 678-690 - Masurah Mohamad, Ali Selamat:

A New Soft Rough Set Parameter Reduction Method for an Effective Decision-Making. 691-704 - Faizura Haneem, Nazri Kama, Rosmah Ali, Ali Selamat:

Applying Data Analytics Approach in Systematic Literature Review: Master Data Management Case Study. 705-718 - Shashank Shrestha

, Wanming Chu, Yilang Wu, Ruth Cortez, Alexander Vazhenin, Absalom Shu, Subhash Bhalla
:
Workflow Based Query Management System for Astronomical Data Repository. 719-730 - Lim Kok Cheng

, Ali Selamat, Mohd Hazli Mohamed Zabil, Md. Hafiz Selamat, Rose Alinda Alias, Fatimah Puteh, Farhan Mohamed, Ondrej Krejcar
:
Usability Prioritization Using Performance Metrics and Hierarchical Agglomerative Clustering in MAR-Learning Application. 731-744
Chapter 7. Modelling, Analysis and Applications of Intelligent Systems
- Bo Huang, Zhijun Fang, Guoqing Wu, Xiankun Sun, Yongbin Gao:

A New Code Generation Method for Software Engineering: From Requirements Model to Source Code. 747-765 - Yinglin Wang, Jianzhang Zhang:

An Aspect-Based Unsupervised Approach for Classifying Non-Functional Requirements on Software Reviews. 766-778 - Construction of Intelligent Tutoring System Based on Semantic Web. 779-793

- Juan Pu, Xing Wu, Yike Guo

, Shaorong Xie, Huayan Pu, Yan Peng:
The Combat of Unmanned Surface Vehicles Based on Wolves Attack. 794-805 - Yuan Liu, Xing Wu, Yike Guo

, Shaorong Xie, Huayan Pu, Yan Peng:
The Cooperative Defense Strategy by Multi-USVs. 806-814 - Xing Wu, Yuan Liu, Yike Guo

, Shaorong Xie, Huayan Pu, Yan Peng:
The Cooperative Defense System by Team of USVs in Complicated Sea Environment. 815-823 - Gajo Petrovic, Hamido Fujita:

Deep Correct: Deep Learning Color Correction for Color Blindness. 824-834

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














