


default search action
ICCDA 2017: Lakeland, FL, USA
- Proceedings of the International Conference on Compute and Data Analysis, ICCDA 2017, Lakeland, FL, USA, May 19-23, 2017. ACM 2017, ISBN 978-1-4503-5241-3

Network engineering
- Ahamed Aljuhani, Talal Alharbi, Hang Liu:

XFirewall: A Dynamic and Additional Mitigation Against DDoS Storm. 1-5 - Ehab Atif Abozinadah

, James H. Jones Jr.:
A Statistical Learning Approach to Detect Abusive Twitter Accounts. 6-13 - Ali Choumane, Zein Al Abidin Ibrahim

, Bilal Chebaro:
Profiles Matching in Social Networks Based on Semantic Similarities and Common Relationships. 14-18 - Kazuhisa Noguchi, Tomoya Iida, Eisuke Ito

:
An Analysis of CGM Contents Pageview Using SIR Model and GBM. 19-22 - Alex V. Mbaziira, James H. Jones:

Hybrid Text-based Deception Models for Native and Non-Native English Cybercriminal Networks. 23-27
Software development and maintenance
- Reyhaneh Raissi:

Improving Readability of Software Model with Adding Visualized Extra Information to UML Diagram. 28-32 - Mohammed Al-Obeidallah

, Miltos Petridis, Stelios Kapetanakis:
MLDA: A Multiple Levels Detection Approach for Design Patterns Recovery. 33-40 - Alhanouf Aldayel, Khalid Alnafjan:

Challenges and Best Practices for Mobile Application Development: Review Paper. 41-48
Machine learning and applications
- Alok Sharma, Anupam Shukla, Ritu Tiwari, Apoorva Mishra

:
Mortality Prediction of ICU patients using Machine Leaning: A survey. 49-53 - Basman M. Hasan Alhafidh

, William H. Allen
:
Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment. 54-59 - R. Alan Burnett, Dong Si:

Prediction of Injuries and Fatalities in Aviation Accidents through Machine Learning. 60-68 - Todor K. Avramov, Dong Si:

Comparison of Feature Reduction Methods and Machine Learning Models for Breast Cancer Diagnosis. 69-74 - Joe Ma, Dong Si:

Analyze NYC Transportation to Mitigate Speeding and Explore New Business Models Using Machine Learning. 75-80
Data analysis and management
- Xin Liu, Yutong Lu, Chunjia Wu, Jieting Wu, Yachao Shao

:
UGSD: Scalable and Efficient Metadata Management for EB-Scale File Systems. 81-90 - Youness Madani

, Jemaa Bengourram
, Mohammed Erritali
:
Social Login and Data Storage in the Big Data File System HDFS. 91-97 - Jaime Yeckle, Sherif Abdelwahed:

An Evaluation of Selection Method in the Classification of Scada Datasets Based on the Characteristics of the Data and Priority of Performance. 98-103 - Jeffrey Smith, Manjeet Rege:

The Data Warehousing (R) Evolution: Where's it headed next? 104-108 - Vishakha Sharma, Andrew Stranieri

, Julien Ugon
, Peter Vamplew
, Laura Martin:
An Agile Group Aware Process beyond CRISP-DM: A Hospital Data Mining Case Study. 109-113 - Mohamed Ragab Moaawad

, Hoda M. O. Mokhtar
, Haytham Tawfeek al Feel:
On-The-Fly Academic Linked Data Integration. 114-122 - Ahsan Abdullah, Amir Hussain

, Imtiaz Hussain Khan
:
Predicting Obesity Using Longitudinal Near Infra-Red Spectroscopy (NIRS) Data. 123-128 - Sheikh Rabiul Islam

, William Eberle, Sheikh Khaled Ghafoor:
Mining Bad Credit Card Accounts from OLAP and OLTP. 129-137 - Melissa Eadie, Robert James Steele:

Non-invasive Blood Glucose Monitoring and Data Analytics. 138-142 - Olga Gorskikh, Pekka Malo

, Pauliina Ilmonen:
Nonparametric Splitting Algorithm for Detecting Structural Changes in Predictive Relationships. 143-149 - Yingjie Liu, Xinhuai Tang:

Word Web Cluster on Sparse Data of Social Network Based on Thematic Tree. 150-154 - Keren Ouaknine, Oran Agra, Zvika Guz:

Optimization of RocksDB for Redis on Flash. 155-161
Image processing
- Xiangli Tan, Jungang Yang, Xinpu Deng:

Star Control Points Optimization on Remote Sensing Image Geometric Rectification. 162-166 - Ganapatsingh G. Rajput, Ramesh Chavan:

A Novel Approach for Image Steganography based on LSB Technique. 167-170 - Chi Zhang, Jin Zheng, Yugui Zhang, Zhi Zhang:

Moving Object Detection Algorithm Based on Pixel Background Sample Sets in Panoramic Scanning Mode. 171-175 - Edison Paria

, Rolando Jesus Cardenas T., Juan Gutierrez, Jose Galdos:
An Improved Face Recognition Based on Illumination Normalization Techniques and Elastic Bunch Graph Matching. 176-180 - Aleksandr A. Loginov, Evgeniy R. Muratov, Mikhail B. Nikiforov:

Image Quality Estimation Using Integral Indicator. 181-184
Computer theory and information engineering
- Yejin Jo, Eun-Gyeong Kim, Yongju Shin:

Graphical Keyword Service for Research Papers with Text-Mining Method. 185-190 - Jie Zhang, Chuan Xiao

, Toyohide Watanabe:
A Framework for Presentation Slide Design Support. 191-196 - Khalida Douibi

, Nesma Settouti, Mohammed Amine Chikh:
The Homogeneous Ensemble Methods for MLknn Algorithm. 197-201 - Zhengzheng Xu, Hongji Xu, Hui Yuan

, Mingyang Ji, Haiteng Fang:
Collaborative Filtering Recommendation Algorithm Based on Category and Penalty. 202-206 - Tony Lindgren:

Randomized Separate and Conquer Rule induction. 207-214 - Amr Abd Elawed Abozeid

, Hesham Farouk, Kamal ElDahshan:
Scalable Video Summarization: A Comparative Study. 215-219 - Talal Alharbi, Ahamed Aljuhani, Hang Liu, Chunqiang Hu:

Smart and Lightweight DDoS Detection Using NFV. 220-227 - Yusuke Adachi, Naoya Onimura, Takanori Yamashita, Sachio Hirokawa

:
Classification of Imbalanced Documents by Feature Selection. 228-232 - M. Fatih Aydogdu, M. Fatih Demirci:

Age Classification Using an Optimized CNN Architecture. 233-239 - Thuc-Doan Do, Tuan Minh Tran

, Xuan-May Thi Le
, Thuy-Van T. Duong:
Detecting Special Lecturers Using Information theory-based Outlier Detection Method. 240-244 - Zenun Kastrati

, Sule Yildirim Yayilgan
:
Supervised Ontology-Based Document Classification Model. 245-251 - Abdelaziz Mamouni

, Abdelaziz Marzak:
ZCP Modernization by Recovering ZCM Models from Existing Platforms. 252-256 - Wei-Ming Liu, Bin Yu, Yu Hui, Jun-Sheng Wu:

Three-Dimensional Geometric Statistical Model Based on Locating Feature Points of Gaussian Curvature Flow and Vector Inner Product. 257-262 - Tim Levene, Robert Steele:

The Quantified Self and Physical Therapy: The Application of Motion Sensing Technologies. 263-267
Signal analysis and processing
- Chuanwu Chen, Guangyuan Liu, Wanhui Wen:

The Recognition and Classification of Stress Base on Pulse Transit Time Series. 268-272 - Zhichao Sha, Fengbo Lu, Weidong Sheng:

Blind Source Separation with Compressively Sensed Based on SBL. 273-276 - Alberto Ochoa, Luis J. Mena

, Vanessa G. Felix:
Noise-Tolerant Neural Network Approach for Electrocardiogram Signal Classification. 277-282
System architecture and security
- Xiuhai Cui, Yu Peng, Xiyuan Peng:

A Universal Test System Framework and Its Application on Satellite Test. 283-288 - Cem Kösemen

, Gökhan Dalkiliç
:
Designing a Random Number Generator for Secure Communication with WISP. 289-292 - Donghwoon Kwon, Geumchae Yoon, Sang-Youn Kim, Young-Jik Kwon:

A Study on Auto Patrol Drone Development for Safety Management. 293-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














