dblp: ICSCA 2020 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


9th ICSCA 2020: Langkawi, Malaysia

jump to- Soft Computing and Methods
- Data Analysis and Processing
- Algorithm Modeling and Optimization
- Image Processing
- Software Design and Program Development
- Software Testing and Quality Assessment
- Data Communication and Information System
- Computer Science and Information Technology
- Information and Data Security

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Soft Computing and Methods

Tianyou Yang, Yingjie Shi, Haiqiao Huang:
CLDM: A Clothing Landmark Detector Based on Mask R-CNN. 1-5

Erna Hikmawati, Kridanto Surendro
:
How to Determine Minimum Support in Association Rule. 6-10

Ruiyun Zhu, Jingcheng Shen, Xiangtian Deng, Marcus Wallden, Fumihiko Ino:
Training Strategies for CNN-based Models to Parse Complex Floor Plans. 11-16

Masaya Shimakawa, Kentaro Hayashi, Shigeki Hagihara, Naoki Yonezaki:
Towards Interpretation of Abstract Instructions Using Declarative Constraints in Temporal Logic. 17-20

Thang V. Nguyen, Nam T. H. Nguyen, Triet Le, Sang T. T. Nguyen, Lam Huynh:
Estimation of Heat of Formation for Chemical Systems using the Lasso Regression-Based Approach. 21-25

Anam Habib, Nosheen Jelani, Asad Masood Khattak, Saima Akbar, Muhammad Zubair Asghar:
Exploiting Deep Neural Networks for Intention Mining. 26-30
Data Analysis and Processing

Gangani Ariyarathne, Senuri De Silva, Sanuwani Dayarathna, Dulani Meedeniya
, Sampath Jayarathna:
ADHD Identification using Convolutional Neural Network with Seed-based Approach for fMRI Data. 31-35

Heru Nugroho
, Nugraha Priya Utama
, Kridanto Surendro
:
Performance Evaluation for Class Center-Based Missing Data Imputation Algorithm. 36-40

Raphael Hartner, Vitaliy Mezhuyev
, Martin Tschandl
, Christian Bischof:
Digital Shop Floor Management: A Practical Framework For Implementation. 41-45

Heru Nugroho
, Nugraha Priya Utama
, Kridanto Surendro
:
Comparison Method for Handling Missing Data in Clinical Studies. 46-50

Mageshwari Valachamy, Shamsul Sahibuddin, Noor Azurati Ahmad
, Nur Azaliah Abu Bakar:
Geospatial Data Sharing: Preliminary Studies on Issues and Challenges in Natural Disaster Management. 51-56

Heru Nugroho
, Soni Fajar Surya Gumilang:
Recommendations for Improving Data Management Process in Government of Bandung Regency using COBIT 4.1 Framework. 57-61
Algorithm Modeling and Optimization

Md. Abdul Kader
, Kamal Z. Zamli:
Adopting Jaya Algorithm for Team Formation Problem. 62-66

Rabah Mazouzi
, Philippe Harel:
A Hybrid "Quantum and Classical" Method for Outlier Detection. 67-73

Tuyen Phong Truong, Toan Hai Le:
A Distributed Directed Breadth-First Search Algorithm Based on Message-Passing Model for Efficient Line-of-Sight Computation. 74-78

Md. Abdul Kader
, Jamal A. Jamaluddin, Kamal Z. Zamli:
An Educational Tool Aimed at Learning Metaheuristics. 79-83

Yi Zhou, Shanru Li, Chongwen Wang:
Research on Product Detection Algorithm for Intelligent Refrigerator. 84-88

Rui Sun, Yuqiang Li:
Applying Prefixed-Itemset and Compression Matrix to Optimize the MapReduce-based Apriori Algorithm on Hadoop. 89-93

Muhammad Zubair Rehman, Kamal Z. Zamli, Abdullah B. Nasser:
An Improved Genetic Bat algorithm for Unconstrained Global Optimization Problems. 94-98

Muhammad Nur Fikri Hishamuddin, Mohd Fadzil Hassan
, Ainul Akmar Mokhtar:
Improving Classification Accuracy of Random Forest Algorithm Using Unsupervised Discretization with Fuzzy Partition and Fuzzy Set Intervals. 99-104

Abdullah B. Nasser, Antar Shaddad Abdul-Qawy
, Nibras Abdullah, Fadhl Hujainah
, Kamal Z. Zamli, Waheed Ali H. M. Ghanem:
Latin Hypercube Sampling Jaya Algorithm based Strategy for T-way Test Suite Generation. 105-109
Image Processing

Samarth Gupta:
Real Time Face Recognition on an Edge Computing Device. 110-113

Xin-Yi Peng, Jun Cao, Fuyuan Zhang:
Masked Face Detection Based on Locally Nonlinear Feature Fusion. 114-118

Oluyinka Iyabo Omotosho, Yetunde Akinwale, Adedoyin Idris:
Semantic Based Vitamin Deficiency Monitoring System. 119-123

Risako Aoki, Takuro Oki, Ryusuke Miyamoto:
Accuracy Improvement of Human Tracking in Aerial Images Using Error Correction Based on Color Information. 124-128

Le Dinh Duy
, Ngo Tuan Anh, Ngo Tung Son
, Nguyen Viet Tung, Nguyen Ba Duong, Muhammad Hassan Raza Khan
:
Deep Learning in Semantic Segmentation of Rust in Images. 129-132

Guoying Liu, Jici Xing, Jing Xiong:
Spatial Pyramid Block for Oracle Bone Inscription Detection. 133-140

Ziyao Wang, Dali Yang, Qiang Tong
:
A Method of Workpiece Coherent Line Detection Based on Progressive Probabilistic Hough Transform. 141-146
Software Design and Program Development

Rimsha Khan, Farooque Azam, Bilal Maqbool, Muhammad Waseem Anwar
:
A Framework for Automated Reengineering of BPMN Models by Excluding Inefficient Activities. 147-151

Hamza Ghandorh, Abdulfattah Noorwali, Ali Bou Nassif, Luiz Fernando Capretz, Roy Eagleson:
A Systematic Literature Review for Software Portability Measurement: Preliminary Results. 152-157

Shahida Sulaiman, Siti Julia Mohd Shahrol, Abd Rahman Abd Samad:
Service Learning in Application Development Course: A Case Study of a Rural Community Engagement. 158-162

Kaito Yoshino, Saeko Matsuura:
Requirements Traceability Management Support Tool for UML Models. 163-166

Tamim Al Mahmud
, Md Gulzar Hussain
, Sumaiya Kabir, Hasnain Ahmad, Mahmudus Sobhan:
A Keyword Based Technique to Evaluate Broad Question Answer Script. 167-171

Nualsawat Hiransakolwong:
EQ101: Emotional Quotient Assessment A Mobile Application for Students. 172-176
Software Testing and Quality Assessment

Huanyu Wu:
A Systematical Study for Deep Learning Based Android Malware Detection. 177-182

Syed Husnain Kazmi, Farooque Azam, Muhammad Waseem Anwar
, Bilal Maqbool:
A Meta-Model for Automated Black-Box Testing of Visualization Based Software Applications. 183-187

Qian Wang, Wei Zhang
, Jianhui Jiang, Long Li:
A Reliability Automatic Assessment Framework of Open Source Software Based on JIRA. 188-193

Ahmad Naim Irfan, Aswami Ariffin, Mohd Naz'ri Mahrin, Syahid Anuar:
A Malware Detection Framework Based on Forensic and Unsupervised Machine Learning Methodologies. 194-200

Muhammad Sohaib Munir, Hafsa Tanveer, Urooj Fatima
:
Mixed Initiative Realizability Problem Resolution Using UML Composite States. 201-205

Lin Zhang, Ning Li, Xia Hou, Yingai Tian:
Automated Office Software Test Method. 206-211

Hanseong Lee, Hyung-Woo Lee:
New Approach on Steganalysis: Reverse-Engineering based Steganography SW Analysis. 212-216
Data Communication and Information System

Changsong Ma, Hongwei Rong, Yushu Liu:
Design of Cultural Relics Protection Micro-environment Monitoring System Based on ZigBee Wireless Communication. 217-221

Naveen Kumar Gupta
, Rama Shankar Yadav
, Rajendra Kumar Nagaria:
Anchor Based Geographical Routing in WSN. 222-226

Noriaki Yoshiura, Keigo Sugiyama:
Packet Reachability Verification in OpenFlow Networks. 227-231

Ekkachan Rattanalerdnusorn, Montida Pattaranantakul, Phithak Thaenkaew, Chalee Vorakulpipat:
IoTDePT: Detecting Security Threats and Pinpointing Anomalies in an IoT environment. 232-236

Zukun Lu, Feiqiang Chen, Honglei Lin, Yifan Sun, Yuchen Xie:
A Novel Method of Distortionless Correlation Function after STAP for BOC. 237-241

Noriaki Yoshiura, Kento Koizumi:
A Method of Collecting the IP Addresses of Hidden Server in Tor Networks. 242-246

Kim-Mey Chew
, Syvester Chiang-Wei Tan, Gary Chee-Wyai Loh
, Nancy Bundan, Siew-Ping Yiiong:
IoT Soil Moisture Monitoring and Irrigation System Development. 247-252

Tuyen Phong Truong, Toan Hai Le:
Modeling and Simulating Concurrent Communications of Distributed Sensing Networks. 253-257
Computer Science and Information Technology

Ma Chi:
Backward Slicing Analysis on Debug Log for Crash Comprehension. 258-263

Abdullahi Abubakar Kawu
, Abdulkarim Abdullahi, Elijah Joseph
, Amit Mishra
, Abdulganiyu Abdulrahman:
MIRCS: A Mobile USSD-SMS Interactive Result Checking System for Resource-Constrained Settings. 264-268

Chengcheng Peng, Bin Wu, Zekun Li:
BGSGA: Combining Bi-GRU and Syntactic Graph Attention for Improving Distant Supervision Relation Extraction. 269-275

Wong Keng Tuck, Chien-Le Goh, Ng Hu:
A False Negative Cost Minimization Ensemble Methods for Customer Churn Analysis. 276-280

Hireche Samia
, Dennai Abdeslem
:
A Review of Artificial Intelligence Techniques used for Urban Automatic Incident Detection Systems. 281-286

Ihor Lubashevsky, Akihito Usui, Kaito Morimura:
Non-Stationary Car-Following Dynamics: Driving Simulator Experiments. 287-291

Tiangang Bai, Hongxu Hou, Yatu Ji:
Sub-word Embedding Auxiliary Encoding in Mongolian-Chinese Neural Machine Translation. 292-296

Long Xia, Sun Chunxia, Tan Ming:
Design and Implementation of Intelligent Ear Tag for Dairy Cows in Farms. 297-301

Xinwei Zhang, Jin Wang, Yuxiao Zhang, Guodong Lu:
Responsive Motif Exploration Using Symmetry Dependency Syntax. 302-306

Fathima Shanaz, Roshan G. Ragel:
Wikidata based Location Entity Linking. 307-312

Hernan M. Palombo, Egor Dolzhenko, Jay Ligatti, Hao Zheng:
Stream-Monitoring Automata. 313-320

Uwe Brunner, Christoph Hechtl, Vitaliy Mezhuyev
:
Development of a Parameterizable Process-Oriented Model for Freight Cost Estimation. 321-325
Information and Data Security

Jing Huey Khor
, Mansur Aliyu Masama, Michail Sidorov
, WeiChung Leong, JiaJun Lim:
An Improved Gas Efficient Library for Securing IoT Smart Contracts Against Arithmetic Vulnerabilities. 326-330

Danielle Ferguson, Yan Albright, Daniel Lomsak, Tyler Hanks
, Kevin Orr, Jay Ligatti:
PoCo: A Language for Specifying Obligation-Based Policy Compositions. 331-338

Shumaila Qamar, Wasi Haider Butt, Muhammad Waseem Anwar, Farooque Azam, Muhammad Qasim Khan:
A Comprehensive Investigation of Universal Verification Methodology (UVM) Standard for Design Verification. 339-343

Kuo Zuo, Ning Li, Yingai Tian, Xia Hou:
Design of An Automated Testing Tool for Typesetting of Reflowable Documents. 344-350

Ahmed Iqbal Pritom, Mehrab Zaman Chowdhury, Joy Protim, Shanto Roy, Md. Rashedur Rahman
, Sadia Mehnaz Promi:
Combining Movement Model with Finger-Stroke Level Model Towards Designing a Security Enhancing Mobile Friendly CAPTCHA. 351-356

Koji Ishii, Shin-ya Nishizaki
:
Static Code Analysis Using Refinement Types based on Design by Contract. 357-363

Aman Kumar Singh, Raj K. Jaiswal:
DDoSify: Server Workload Migration During DDOS Attack In NFV. 364-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






