


default search action
9th ICSCA 2020: Langkawi, Malaysia
- Proceedings of the 9th International Conference on Software and Computer Applications, ICSCA 2020, Langkawi, Malaysia, February 18-21, 2020. ACM 2020, ISBN 978-1-4503-7665-5

Soft Computing and Methods
- Tianyou Yang, Yingjie Shi, Haiqiao Huang:

CLDM: A Clothing Landmark Detector Based on Mask R-CNN. 1-5 - Erna Hikmawati, Kridanto Surendro

:
How to Determine Minimum Support in Association Rule. 6-10 - Ruiyun Zhu, Jingcheng Shen, Xiangtian Deng, Marcus Wallden, Fumihiko Ino:

Training Strategies for CNN-based Models to Parse Complex Floor Plans. 11-16 - Masaya Shimakawa, Kentaro Hayashi, Shigeki Hagihara, Naoki Yonezaki:

Towards Interpretation of Abstract Instructions Using Declarative Constraints in Temporal Logic. 17-20 - Thang V. Nguyen, Nam T. H. Nguyen, Triet Le, Sang T. T. Nguyen, Lam Huynh:

Estimation of Heat of Formation for Chemical Systems using the Lasso Regression-Based Approach. 21-25 - Anam Habib, Nosheen Jelani, Asad Masood Khattak, Saima Akbar, Muhammad Zubair Asghar:

Exploiting Deep Neural Networks for Intention Mining. 26-30
Data Analysis and Processing
- Gangani Ariyarathne, Senuri De Silva, Sanuwani Dayarathna, Dulani Meedeniya

, Sampath Jayarathna:
ADHD Identification using Convolutional Neural Network with Seed-based Approach for fMRI Data. 31-35 - Heru Nugroho

, Nugraha Priya Utama
, Kridanto Surendro
:
Performance Evaluation for Class Center-Based Missing Data Imputation Algorithm. 36-40 - Raphael Hartner, Vitaliy Mezhuyev

, Martin Tschandl
, Christian Bischof:
Digital Shop Floor Management: A Practical Framework For Implementation. 41-45 - Heru Nugroho

, Nugraha Priya Utama
, Kridanto Surendro
:
Comparison Method for Handling Missing Data in Clinical Studies. 46-50 - Mageshwari Valachamy, Shamsul Sahibuddin, Noor Azurati Ahmad

, Nur Azaliah Abu Bakar:
Geospatial Data Sharing: Preliminary Studies on Issues and Challenges in Natural Disaster Management. 51-56 - Heru Nugroho

, Soni Fajar Surya Gumilang:
Recommendations for Improving Data Management Process in Government of Bandung Regency using COBIT 4.1 Framework. 57-61
Algorithm Modeling and Optimization
- Md. Abdul Kader

, Kamal Z. Zamli:
Adopting Jaya Algorithm for Team Formation Problem. 62-66 - Rabah Mazouzi

, Philippe Harel:
A Hybrid "Quantum and Classical" Method for Outlier Detection. 67-73 - Tuyen Phong Truong, Toan Hai Le:

A Distributed Directed Breadth-First Search Algorithm Based on Message-Passing Model for Efficient Line-of-Sight Computation. 74-78 - Md. Abdul Kader

, Jamal A. Jamaluddin, Kamal Z. Zamli:
An Educational Tool Aimed at Learning Metaheuristics. 79-83 - Yi Zhou, Shanru Li, Chongwen Wang:

Research on Product Detection Algorithm for Intelligent Refrigerator. 84-88 - Rui Sun, Yuqiang Li:

Applying Prefixed-Itemset and Compression Matrix to Optimize the MapReduce-based Apriori Algorithm on Hadoop. 89-93 - Muhammad Zubair Rehman, Kamal Z. Zamli, Abdullah B. Nasser:

An Improved Genetic Bat algorithm for Unconstrained Global Optimization Problems. 94-98 - Muhammad Nur Fikri Hishamuddin, Mohd Fadzil Hassan

, Ainul Akmar Mokhtar:
Improving Classification Accuracy of Random Forest Algorithm Using Unsupervised Discretization with Fuzzy Partition and Fuzzy Set Intervals. 99-104 - Abdullah B. Nasser, Antar Shaddad Abdul-Qawy

, Nibras Abdullah, Fadhl Hujainah
, Kamal Z. Zamli, Waheed Ali H. M. Ghanem:
Latin Hypercube Sampling Jaya Algorithm based Strategy for T-way Test Suite Generation. 105-109
Image Processing
- Samarth Gupta:

Real Time Face Recognition on an Edge Computing Device. 110-113 - Xin-Yi Peng, Jun Cao, Fuyuan Zhang:

Masked Face Detection Based on Locally Nonlinear Feature Fusion. 114-118 - Oluyinka Iyabo Omotosho, Yetunde Akinwale, Adedoyin Idris:

Semantic Based Vitamin Deficiency Monitoring System. 119-123 - Risako Aoki, Takuro Oki, Ryusuke Miyamoto:

Accuracy Improvement of Human Tracking in Aerial Images Using Error Correction Based on Color Information. 124-128 - Le Dinh Duy

, Ngo Tuan Anh, Ngo Tung Son
, Nguyen Viet Tung, Nguyen Ba Duong, Muhammad Hassan Raza Khan
:
Deep Learning in Semantic Segmentation of Rust in Images. 129-132 - Guoying Liu, Jici Xing, Jing Xiong:

Spatial Pyramid Block for Oracle Bone Inscription Detection. 133-140 - Ziyao Wang, Dali Yang, Qiang Tong

:
A Method of Workpiece Coherent Line Detection Based on Progressive Probabilistic Hough Transform. 141-146
Software Design and Program Development
- Rimsha Khan, Farooque Azam, Bilal Maqbool, Muhammad Waseem Anwar

:
A Framework for Automated Reengineering of BPMN Models by Excluding Inefficient Activities. 147-151 - Hamza Ghandorh, Abdulfattah Noorwali, Ali Bou Nassif, Luiz Fernando Capretz, Roy Eagleson:

A Systematic Literature Review for Software Portability Measurement: Preliminary Results. 152-157 - Shahida Sulaiman, Siti Julia Mohd Shahrol, Abd Rahman Abd Samad:

Service Learning in Application Development Course: A Case Study of a Rural Community Engagement. 158-162 - Kaito Yoshino, Saeko Matsuura:

Requirements Traceability Management Support Tool for UML Models. 163-166 - Tamim Al Mahmud

, Md Gulzar Hussain
, Sumaiya Kabir, Hasnain Ahmad, Mahmudus Sobhan:
A Keyword Based Technique to Evaluate Broad Question Answer Script. 167-171 - Nualsawat Hiransakolwong:

EQ101: Emotional Quotient Assessment A Mobile Application for Students. 172-176
Software Testing and Quality Assessment
- Huanyu Wu:

A Systematical Study for Deep Learning Based Android Malware Detection. 177-182 - Syed Husnain Kazmi, Farooque Azam, Muhammad Waseem Anwar

, Bilal Maqbool:
A Meta-Model for Automated Black-Box Testing of Visualization Based Software Applications. 183-187 - Qian Wang, Wei Zhang

, Jianhui Jiang, Long Li:
A Reliability Automatic Assessment Framework of Open Source Software Based on JIRA. 188-193 - Ahmad Naim Irfan, Aswami Ariffin, Mohd Naz'ri Mahrin, Syahid Anuar:

A Malware Detection Framework Based on Forensic and Unsupervised Machine Learning Methodologies. 194-200 - Muhammad Sohaib Munir, Hafsa Tanveer, Urooj Fatima

:
Mixed Initiative Realizability Problem Resolution Using UML Composite States. 201-205 - Lin Zhang, Ning Li, Xia Hou, Yingai Tian:

Automated Office Software Test Method. 206-211 - Hanseong Lee, Hyung-Woo Lee:

New Approach on Steganalysis: Reverse-Engineering based Steganography SW Analysis. 212-216
Data Communication and Information System
- Changsong Ma, Hongwei Rong, Yushu Liu:

Design of Cultural Relics Protection Micro-environment Monitoring System Based on ZigBee Wireless Communication. 217-221 - Naveen Kumar Gupta

, Rama Shankar Yadav
, Rajendra Kumar Nagaria:
Anchor Based Geographical Routing in WSN. 222-226 - Noriaki Yoshiura, Keigo Sugiyama:

Packet Reachability Verification in OpenFlow Networks. 227-231 - Ekkachan Rattanalerdnusorn, Montida Pattaranantakul, Phithak Thaenkaew, Chalee Vorakulpipat:

IoTDePT: Detecting Security Threats and Pinpointing Anomalies in an IoT environment. 232-236 - Zukun Lu, Feiqiang Chen, Honglei Lin, Yifan Sun, Yuchen Xie:

A Novel Method of Distortionless Correlation Function after STAP for BOC. 237-241 - Noriaki Yoshiura, Kento Koizumi:

A Method of Collecting the IP Addresses of Hidden Server in Tor Networks. 242-246 - Kim-Mey Chew

, Syvester Chiang-Wei Tan, Gary Chee-Wyai Loh
, Nancy Bundan, Siew-Ping Yiiong:
IoT Soil Moisture Monitoring and Irrigation System Development. 247-252 - Tuyen Phong Truong, Toan Hai Le:

Modeling and Simulating Concurrent Communications of Distributed Sensing Networks. 253-257
Computer Science and Information Technology
- Ma Chi:

Backward Slicing Analysis on Debug Log for Crash Comprehension. 258-263 - Abdullahi Abubakar Kawu

, Abdulkarim Abdullahi, Elijah Joseph
, Amit Mishra
, Abdulganiyu Abdulrahman:
MIRCS: A Mobile USSD-SMS Interactive Result Checking System for Resource-Constrained Settings. 264-268 - Chengcheng Peng, Bin Wu, Zekun Li:

BGSGA: Combining Bi-GRU and Syntactic Graph Attention for Improving Distant Supervision Relation Extraction. 269-275 - Wong Keng Tuck, Chien-Le Goh, Hu Ng:

A False Negative Cost Minimization Ensemble Methods for Customer Churn Analysis. 276-280 - Hireche Samia

, Dennai Abdeslem
:
A Review of Artificial Intelligence Techniques used for Urban Automatic Incident Detection Systems. 281-286 - Ihor Lubashevsky, Akihito Usui, Kaito Morimura:

Non-Stationary Car-Following Dynamics: Driving Simulator Experiments. 287-291 - Tiangang Bai, Hongxu Hou, Yatu Ji:

Sub-word Embedding Auxiliary Encoding in Mongolian-Chinese Neural Machine Translation. 292-296 - Long Xia, Sun Chunxia, Tan Ming:

Design and Implementation of Intelligent Ear Tag for Dairy Cows in Farms. 297-301 - Xinwei Zhang, Jin Wang, Yuxiao Zhang, Guodong Lu:

Responsive Motif Exploration Using Symmetry Dependency Syntax. 302-306 - Fathima Shanaz, Roshan G. Ragel:

Wikidata based Location Entity Linking. 307-312 - Hernan M. Palombo, Egor Dolzhenko, Jay Ligatti, Hao Zheng:

Stream-Monitoring Automata. 313-320 - Uwe Brunner, Christoph Hechtl, Vitaliy Mezhuyev

:
Development of a Parameterizable Process-Oriented Model for Freight Cost Estimation. 321-325
Information and Data Security
- Jing Huey Khor

, Mansur Aliyu Masama, Michail Sidorov
, WeiChung Leong, JiaJun Lim:
An Improved Gas Efficient Library for Securing IoT Smart Contracts Against Arithmetic Vulnerabilities. 326-330 - Danielle Ferguson, Yan Albright, Daniel Lomsak, Tyler Hanks

, Kevin Orr, Jay Ligatti:
PoCo: A Language for Specifying Obligation-Based Policy Compositions. 331-338 - Shumaila Qamar, Wasi Haider Butt, Muhammad Waseem Anwar, Farooque Azam, Muhammad Qasim Khan:

A Comprehensive Investigation of Universal Verification Methodology (UVM) Standard for Design Verification. 339-343 - Kuo Zuo, Ning Li, Yingai Tian, Xia Hou:

Design of An Automated Testing Tool for Typesetting of Reflowable Documents. 344-350 - Ahmed Iqbal Pritom, Mehrab Zaman Chowdhury, Joy Protim, Shanto Roy, Md. Rashedur Rahman

, Sadia Mehnaz Promi:
Combining Movement Model with Finger-Stroke Level Model Towards Designing a Security Enhancing Mobile Friendly CAPTCHA. 351-356 - Koji Ishii, Shin-ya Nishizaki

:
Static Code Analysis Using Refinement Types based on Design by Contract. 357-363 - Aman Kumar Singh, Raj K. Jaiswal:

DDoSify: Server Workload Migration During DDOS Attack In NFV. 364-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














