Home
Important Dates
Call for Papers
Paper Submission
Camera Ready
Organizing Committee
Program Committee
Sponsors
Venue
Contacts
Conference Program
Keynote Speakers
Workshops
Industrial Tracks
Special Tracks
Registration
Travel Information
Accommodation
Visa
Best Paper Award
Best Reviewer Award
Support to Student Papers

Accepted Papers

124. Item Recommending by Item Co-purchasing Network and User Preference- Sunantha Sodsee, Maytiyanin Komkhao                
132 Fuzzy logic methodology for cyber security risk mitigation approach- Ahmad AlMogren, Mansour Al-Ali, Ahmad AlMogren            
137 Offline Touched Cursive Script Segmentation Based on Pixel Intensity Analysis- Amjad Rehman                    
140 Rumor Verifications on Facebook: Click Speech of Likes, Comments and Shares- Alton Chua, Snehasish Banerjee            
141 Message Content in the Life of Rumors: Comparing Three Rumor Types- Alton, Y.K. Chua, Rajiv Aricat, Dion Goh        
142 Compliance Evaluation of Information Privacy  Protection in Anglophone West Africa Using  ISO/IEC 29100:2011: A Case of E-Government Systems- Pavol Zavarsky, Amarachi Chinwendu Nwaeze, Ron Ruhl        
144 Analysis of Criminal Behaviors for Suspect Vehicle Detection- Ubon Thongsatapornwatana,    Woraphon Lilakiatsakun,    Akkarach Kawbunjun, Tossapon Boongoen    
145 Analysis and Compliance Evaluation of Cookies-Setting Websites with Privacy Protection Laws- Pavol Zavarsky, Adeyemi Aladeokin,    Neelam Memon        
146 Exploring Automated Essay Scoring for Non-native English Speakers-Amber Nigam                
Mining Affordance-based Substitution Rules: A Dynamic Taxonomy Approach- Rupal Sethi, B Shekar            
148 Prediction of Importance of Figures in Scholarly Papers- Yui Kita, Jun Rekimoto            
Exploring NLP Web APIs for Building Arabic Systems-Sharefah Al-Ghamdi,    Joharah Khabti,    Hend Al-Khalifa        
152 Cryptanalysis of an Authentication Scheme for Multi-Gateway Wireless Sensor Networks- Dongho Won, Taeui Song, Hyoungshick Kim, Dongho Won    
153 Measuring uncertainty to identify missing customer information relevant to the design process- Anna Marti Bigorra            
154 DIO: Efficient Interactive Outlier Analysis over Dynamic Datasets- Chihiro Sakazume, Hiroyuki Kitagawa,    Toshiyuki Amagasa        
Performance Investigation of Scheduling Algorithms for LTE Network- Mohammad Masoom Zafar, Ammar Hafeez            
156 Performance Evaluation of Scheduling Algorithms in FemtoCell for LTE-Advanced Heterogeneous Networks- Mohammad Masoom Zafar, Ammar Hafeez            
157 National Survey of Japanese Universities on Computing Education: Analysis of Non-IT Departments and Courses -Tetsuro Kakeshita                    
158 Shrewd Commodity System for Remote Monitoring of Chicken Homesteads Condition in Arabian Peninsula Based on IoT-Rajesh R.K. Rajamoni Kala, T.M. Bhraguram Thayyil, Saju Mohanan    
159 Measurement and Analysis of Citizens Requests to Government for Non-Emergency Services-    M. Omair Shafiq, Rami Ibrahim            
160Improvement of complete malaria cell image segmentation- Monlica Wattana, Tipwalee Boonsri            
161 Two-level Dynamic Index Pruning- Michael Petrifke, Jan Friedrich, Christoph Lindemann        
Shortest Path Deliveries Using Density-Based Clustering- Lixin Fu                
164 Prototyping a Recommendation System for Ukiyo-e using Hybrid Recommendation Algorithm- Pritish Patil, Jiayun Wang, Yuya Aratani, Kyoji Kawagoe       
165 Stock Prices Flactuation Analysis of Food Companies After the Great East-Japan Earthquake: Application of Random Matrix Theory- Kenji Yamaguchi, Yukari Shirota            
167 Measuring Semantic Textual Similarity using modified Information Content of WordNet and Tri–gram Language Model    Goutam Majumder    Goutam Majumder    Partha Pakray    David Eduardo Pinto Avendaٌo        
168 Mining and Visualization of Interpersonal Interaction Networks- SeungJin Lim                
170 Factor Analysis of Investment Trust Products by Using Monthly Reports and News Articles- Nobuaki Onishi, Qiang Ma, Qiang Ma            
172 Fast Plagiarism Detection Based on Simple Document Similarity- Kensuke Baba                
173 Tweets of Thailand: A Tweet Retrieval System for Domestic Tourism in Thailand- Rangsipan Marukatat, Nutthapon Chinchaipong, Sirapop Prechalertpririya        
174 A HTTP Botnet Detection System Based on Ranking Mechanism-Tzong-Jye Liu, Yuan-Chin Lee,    Chuan-Mu Tseng            
175 CRF-Based Bibliography Extraction from Reference Strings Using a Small Amount of Training Data-    Daiki Namikoshi, Manabu Ohta, Atsuhiro Takasu, Jun Adachi    
177 Enhanced Boolean Model for Scientific Text Information Retrieval-Partha Pakray,    Amarnath Pathak            
179 A Lightweight JSON-based Access Control Policy Evaluation Framework- Hao Jiang,    Ahmed Bouabdallah            
181 Toward Positioning IoT-empowered Business Reengineering in City Platform as a Service-Toshihiko Yamakami                
182 A Migration-oriented Partial Adaptation Architecture for IoT-empowered City Platform as a Servi- Toshihiko Yamakami                
183 Privacy-Preserved Conference Key Distribution Protocol-Chien-Lung Hsu,    Tzu-Wei Lin, Huang-Chia Lu, Tzu-Hsien Chuang, Yu-Han Chen
184 National Survey of Japanese Universities on Computing Education: Analysis of IT Education for High School Teacher License on IT- Kazuhiro Sumi, Tetsuro Kakeshita            
185 Classification of Computer Viruses from Binary Code using Ensemble Classifier and Recursive Feature Elimination- Prasit Usaphapanus, Krerk Piromsopa        
186 National Survey of Japanese Universities on Computing Education: Analysis of Educational Computer System- Mika Ohtsuki, Mitsuhiro Takasaki, Tetsuro Kakeshita        
187 National Survey of Japanese Universities on Computing Education - Analysis of Informatics in  General Education - Naoko TAKAHASHI, Tetsuro Kakeshita        
188 A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments- Tzu-Hsien Chuang, Chien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen    Tzu-Wei Lin, Huang-Chia Lu
189 Scientific Visualiser in personal information management-Veslava Osinska, Grzegorz Osinski            
190 Code Style Analytics for the Automatic Setting of Formatting Rules in IDEs-Eric Torunski, Omair Shafiq,Anthony Whitehead        
191 Syntactical role identification of mathematical expressions- Xing Wang,    Jason Lin, Ryan Vrecenar, Jyh-Charn Liu    
192 Spell Corrector to Social Media Datasets in Message Filtering Systems-Zar Zar Wint, Théo Ducros, Masayoshi Aritsugi        
193 Urban park area feasibility analysis using fuzzy aggregation of multi-spatial criteria and multi-expert weights- Arif Wicaksono, Sunya Sarapirome    
195 A Collaborative Filtering Method for Interactive Platforms-Yan Zhou, Taketoshi Ushiama            
197 Identification of Opinion Leader on Rumor Spreading in Online Social Network Twitter Using Edge Weighting and Centrality Measure Weighting-Fatia Dewi, Satrio Yudhoatmojo, Indra Budi        
198 Can you trust the user? - Collaborative Trust Estimation Model for Recommendations -Daichi Minami, Taketoshi Ushiama            
200 Toward Plagiarism Detection Using Citation Networks- Sidik Soleman, Atsushi Fujii            
Computation of Spread of Tweets on Twitter- Sachin Gupta, Radha Shankarmani, Padmaja Joshi        
202 Analysing the Influence of Semantic Knowledge in Natural Language Generation-Cristina Barros, Elena Lloret            
204 DREAM : Dynamic data Relations Extraction  using Adaptive Multi-agent systems-Elhadi Belghache                
206 Mining and Ranking of Generalized Multi-Dimensional Frequent Subgraphs-    André Petermann, Giovanni Micale, Giacomo Bergami, Alfredo Pulvirenti, Erhard Rahm
209 Transparent Mobility of Devices on the Internet using OpenFlow-    Pedro Braconnot, Velloso Gabriel A. de Oliveira, Peron R. de Sousa, Antonio Augusto de A. Rocha, Pedro Braconnot Velloso    
210 On Cleaning and Organizing Context Logs for Mobile User Preference Profiling- Yao-Chung Fan, Hung-Yuan Chen            
212 SCTP-based Service Migration for VOD Service-Chin-Shiuh Shieh,    Hao-Xiang Gu            
213 Improving the trust of end users in enterprise SOA using combinatorial group testing methods- Siba Mishra, Chiranjeev Kumar            
214 Analyzing Patterns of Numerously Occurring Heart Diseases Using Association Rule Mining- Rashedur M Rahman                    
217 True Satisfaction Ontology in Green e-Marketing nano-Product Sustainable Green Energy Evaluation; with focus on  User Satisfaction Digital Data-Information-Knowledge Implementation 215 Semantic Mechanism Methodology- Hani Abd El-Salam                
216 Minimum node weight spanning trees searching algorithm for broadcast transmission in sensor networks- Zbigniew Lipinski        
218 An Improved Algorithm for Transmission in Heterogeneous Cellular Networks-Yao-Liang Chung
--------------------------------------------------------------------------------------------------------
Note: 1. Only registered papers among the above will appear in the Conference Proceedings and Program.
2. The title of some papers may undergo change.



 

Home | Paper Submission | Program Committees | Registration | Sponsors | Accommodation | Travel Information | Contacts

Copyright (c) 2017 ICDIM2017 all rights reserved.