Accepted Papers
124. Item Recommending by Item Co-purchasing Network and User Preference- Sunantha Sodsee, Maytiyanin Komkhao
132 Fuzzy logic methodology for cyber security risk mitigation approach- Ahmad AlMogren, Mansour Al-Ali, Ahmad AlMogren
137 Offline Touched Cursive Script Segmentation Based on Pixel Intensity Analysis- Amjad Rehman
140 Rumor Verifications on Facebook: Click Speech of Likes, Comments and Shares- Alton Chua, Snehasish Banerjee
141 Message Content in the Life of Rumors: Comparing Three Rumor Types- Alton, Y.K. Chua, Rajiv Aricat, Dion Goh
142 Compliance Evaluation of Information Privacy Protection in Anglophone West Africa Using ISO/IEC 29100:2011: A Case of E-Government Systems- Pavol Zavarsky, Amarachi Chinwendu Nwaeze, Ron Ruhl
144 Analysis of Criminal Behaviors for Suspect Vehicle Detection- Ubon Thongsatapornwatana, Woraphon Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen
145 Analysis and Compliance Evaluation of Cookies-Setting Websites with Privacy Protection Laws- Pavol Zavarsky, Adeyemi Aladeokin, Neelam Memon
146 Exploring Automated Essay Scoring for Non-native English Speakers-Amber Nigam
Mining Affordance-based Substitution Rules: A Dynamic Taxonomy Approach- Rupal Sethi, B Shekar
148 Prediction of Importance of Figures in Scholarly Papers- Yui Kita, Jun Rekimoto
Exploring NLP Web APIs for Building Arabic Systems-Sharefah Al-Ghamdi, Joharah Khabti, Hend Al-Khalifa
152 Cryptanalysis of an Authentication Scheme for Multi-Gateway Wireless Sensor Networks- Dongho Won, Taeui Song, Hyoungshick Kim, Dongho Won
153 Measuring uncertainty to identify missing customer information relevant to the design process- Anna Marti Bigorra
154 DIO: Efficient Interactive Outlier Analysis over Dynamic Datasets- Chihiro Sakazume, Hiroyuki Kitagawa, Toshiyuki Amagasa
Performance Investigation of Scheduling Algorithms for LTE Network- Mohammad Masoom Zafar, Ammar Hafeez
156 Performance Evaluation of Scheduling Algorithms in FemtoCell for LTE-Advanced Heterogeneous Networks- Mohammad Masoom Zafar, Ammar Hafeez
157 National Survey of Japanese Universities on Computing Education: Analysis of Non-IT Departments and Courses -Tetsuro Kakeshita
158 Shrewd Commodity System for Remote Monitoring of Chicken Homesteads Condition in Arabian Peninsula Based on IoT-Rajesh R.K. Rajamoni Kala, T.M. Bhraguram Thayyil, Saju Mohanan
159 Measurement and Analysis of Citizens Requests to Government for Non-Emergency Services- M. Omair Shafiq, Rami Ibrahim
160Improvement of complete malaria cell image segmentation- Monlica Wattana, Tipwalee Boonsri
161 Two-level Dynamic Index Pruning- Michael Petrifke, Jan Friedrich, Christoph Lindemann
Shortest Path Deliveries Using Density-Based Clustering- Lixin Fu
164 Prototyping a Recommendation System for Ukiyo-e using Hybrid Recommendation Algorithm- Pritish Patil, Jiayun Wang, Yuya Aratani, Kyoji Kawagoe
165 Stock Prices Flactuation Analysis of Food Companies After the Great East-Japan Earthquake: Application of Random Matrix Theory- Kenji Yamaguchi, Yukari Shirota
167 Measuring Semantic Textual Similarity using modified Information Content of WordNet and Tri–gram Language Model Goutam Majumder Goutam Majumder Partha Pakray David Eduardo Pinto Avendaٌo
168 Mining and Visualization of Interpersonal Interaction Networks- SeungJin Lim
170 Factor Analysis of Investment Trust Products by Using Monthly Reports and News Articles- Nobuaki Onishi, Qiang Ma, Qiang Ma
172 Fast Plagiarism Detection Based on Simple Document Similarity- Kensuke Baba
173 Tweets of Thailand: A Tweet Retrieval System for Domestic Tourism in Thailand- Rangsipan Marukatat, Nutthapon Chinchaipong, Sirapop Prechalertpririya
174 A HTTP Botnet Detection System Based on Ranking Mechanism-Tzong-Jye Liu, Yuan-Chin Lee, Chuan-Mu Tseng
175 CRF-Based Bibliography Extraction from Reference Strings Using a Small Amount of Training Data- Daiki Namikoshi, Manabu Ohta, Atsuhiro Takasu, Jun Adachi
177 Enhanced Boolean Model for Scientific Text Information Retrieval-Partha Pakray, Amarnath Pathak
179 A Lightweight JSON-based Access Control Policy Evaluation Framework- Hao Jiang, Ahmed Bouabdallah
181 Toward Positioning IoT-empowered Business Reengineering in City Platform as a Service-Toshihiko Yamakami
182 A Migration-oriented Partial Adaptation Architecture for IoT-empowered City Platform as a Servi- Toshihiko Yamakami
183 Privacy-Preserved Conference Key Distribution Protocol-Chien-Lung Hsu, Tzu-Wei Lin, Huang-Chia Lu, Tzu-Hsien Chuang, Yu-Han Chen
184 National Survey of Japanese Universities on Computing Education: Analysis of IT Education for High School Teacher License on IT- Kazuhiro Sumi, Tetsuro Kakeshita
185 Classification of Computer Viruses from Binary Code using Ensemble Classifier and Recursive Feature Elimination- Prasit Usaphapanus, Krerk Piromsopa
186 National Survey of Japanese Universities on Computing Education: Analysis of Educational Computer System- Mika Ohtsuki, Mitsuhiro Takasaki, Tetsuro Kakeshita
187 National Survey of Japanese Universities on Computing Education - Analysis of Informatics in General Education - Naoko TAKAHASHI, Tetsuro Kakeshita
188 A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments- Tzu-Hsien Chuang, Chien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen Tzu-Wei Lin, Huang-Chia Lu
189 Scientific Visualiser in personal information management-Veslava Osinska, Grzegorz Osinski
190 Code Style Analytics for the Automatic Setting of Formatting Rules in IDEs-Eric Torunski, Omair Shafiq,Anthony Whitehead
191 Syntactical role identification of mathematical expressions- Xing Wang, Jason Lin, Ryan Vrecenar, Jyh-Charn Liu
192 Spell Corrector to Social Media Datasets in Message Filtering Systems-Zar Zar Wint, Théo Ducros, Masayoshi Aritsugi
193 Urban park area feasibility analysis using fuzzy aggregation of multi-spatial criteria and multi-expert weights- Arif Wicaksono, Sunya Sarapirome
195 A Collaborative Filtering Method for Interactive Platforms-Yan Zhou, Taketoshi Ushiama
197 Identification of Opinion Leader on Rumor Spreading in Online Social Network Twitter Using Edge Weighting and Centrality Measure Weighting-Fatia Dewi, Satrio Yudhoatmojo, Indra Budi
198 Can you trust the user? - Collaborative Trust Estimation Model for Recommendations -Daichi Minami, Taketoshi Ushiama
200 Toward Plagiarism Detection Using Citation Networks- Sidik Soleman, Atsushi Fujii
Computation of Spread of Tweets on Twitter- Sachin Gupta, Radha Shankarmani, Padmaja Joshi
202 Analysing the Influence of Semantic Knowledge in Natural Language Generation-Cristina Barros, Elena Lloret
204 DREAM : Dynamic data Relations Extraction using Adaptive Multi-agent systems-Elhadi Belghache
206 Mining and Ranking of Generalized Multi-Dimensional Frequent Subgraphs- André Petermann, Giovanni Micale, Giacomo Bergami, Alfredo Pulvirenti, Erhard Rahm
209 Transparent Mobility of Devices on the Internet using OpenFlow- Pedro Braconnot, Velloso Gabriel A. de Oliveira, Peron R. de Sousa, Antonio Augusto de A. Rocha, Pedro Braconnot Velloso
210 On Cleaning and Organizing Context Logs for Mobile User Preference Profiling- Yao-Chung Fan, Hung-Yuan Chen
212 SCTP-based Service Migration for VOD Service-Chin-Shiuh Shieh, Hao-Xiang Gu
213 Improving the trust of end users in enterprise SOA using combinatorial group testing methods- Siba Mishra, Chiranjeev Kumar
214 Analyzing Patterns of Numerously Occurring Heart Diseases Using Association Rule Mining- Rashedur M Rahman
217 True Satisfaction Ontology in Green e-Marketing nano-Product Sustainable Green Energy Evaluation; with focus on User Satisfaction Digital Data-Information-Knowledge Implementation 215 Semantic Mechanism Methodology- Hani Abd El-Salam
216 Minimum node weight spanning trees searching algorithm for broadcast transmission in sensor networks- Zbigniew Lipinski
218 An Improved Algorithm for Transmission in Heterogeneous Cellular Networks-Yao-Liang Chung
--------------------------------------------------------------------------------------------------------
Note: 1. Only registered papers among the above will appear in the Conference Proceedings and Program.
2. The title of some papers may undergo change.
|