Название: Information Technology - New Generations: 15th International Conference on Information Technology Автор: Shahram Latifi Издательство: Springer International Publishing Год: 2018 ISBN: 9783319770277 Серия: Advances in Intelligent Systems and Computing (Book 738) Формат: pdf Страниц: XVII, 818 Размер: 35,5 mb Язык: English
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology – New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education.
1 Safeguarding Personal Health Information: Case Study Holly Gandarilla 2 Cybersecurity as People Powered Perpetual Innovation Mansur Hasib 3 Performance Study of the Impact of Security on 802.1 lac Networks Anthony Tsetse, Emilien Bonniord, Patrick Appiah-Kubi, and Samuel Tweneboah-Kodua 4 Training Neural Tensor Networks with the Never Ending Language Learner Flavio A. O. Santos, Filipe B. do Nascimento, Matheus S. Santos, and Hendrik T. Macedo 5 PERIA-Framework: A Prediction Extension Revision Image Annotation Framework Umer Rashid and Bakhtawar Arif 6 The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan Askar Boranbayev, Seilkhan Boranbayev, Assel Nurusheva. and Kuanysh Yersakhanov 7 Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network Michael Gibbs 8 A Virtual Animated Commentator Architecture for Cybersecurity Competitions Ruth Agada, Jie Yan, and Weifeng Xu 9 Malicious Software Classification Using VGG16 Deep Neural Network’s Bottleneck Features Edmar Rezende, Guilherme Ruppert, Tiago Carvalho, Antonio Theophilo, Fabio Ramos, and Paulo de Geus 10 Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) Hossein Zare. Mohammad Jalal Zare, and Mojgan Azadi 11 A Self Proxy Signature Scheme Over NTRU Lattices Sonika Singh and Sahadeo Padhye 12 Towards an Ontology of Security Assessment: A Core Model Proposal..... Ferrucio de Franco Rosa, Mario Jino, and Rodrigo Bonacin 13 Integration of Mobile Forensic Tool Capabilities Ping Wang, Matt Rosenberg, and Hubert D’Cruze 14 Deep Packet Inspection: A Key Issue for Network Security Hannah Bartus 15 What Pctya/Not Petya Ransom ware Is and What Its Rcmidiations Are Sharifah Yaqoub A. Fayi 16 Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform Anteneh Girina 17 New Techniques for Public Key Encry ption w ith Sender Recovery Murali Godi and Roopa Vishwanathan 18 Cloud Intrusion Detection and Prevention System for M-Voting Application in South Africa: Suricata vs. Snort Moloiyatsana Dina Moloja 19 Protecting Personal Data with Blockchain Technology Alexander Masluk and Mikhail Gofman 20 The Role of CAE-CDE in Cybersecurity Education for Workforce Development Maurice Dawson, Ping Wang, and Kenneth Williams 21 Software Optimizations for DES Shay Gueron and Regev Shemy
Part II Networking and Wireless Communications
22 Design and Development of VXLAN Based Cloud Overlay Network Monitoring System and Environment Shahzada Khurram and Osman Ghazali 23 End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks Vicente Casares-Giner, Tatiana Ines Navas, Dolly Smith Florez, and Tito R. Vargas H. 24 Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges Heleno Cardoso da Silva Filho, Glauco de Figueiredo Cameiro, Ed Santana Martins Costa, andMiguel Monteiro 25 A Dual Canister Medicine IoT Dispenser Peter James Vial, James Sansom, David Stirling, Prashan Premaratne, Le Chung Tran, and Montserrat Ros 26 Local Clock Synchronization Without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks Ayako Arao and Hiroaki Higaki 27 Denial of Service Attacks in Wireless Sensor Networks w ith Proposed Countermeasures Ademola Philip Abidoye and Elisha Oketch Ochola
Part III Education and Technology
28 Internet-Based Education: A New Milestone for Formal Language and Automata Courses Joao E. M. Rocha. Celso Olivete, Pedro H. A. Gomes, Rogerio E. Garcia, Ronaldo С. M. Correia, Gabriel Spadon de Souza, and Danilo M. Eler 29 Teaching Communication Management in Software Projects Through Serious Educational Games Rafaella Marchi Pellegrini, Carlos Eduardo Sanches da Silva, and Adler Diniz de Souza 30 Gamification Applied in the Teaching of Agile Scrum Methodology Luiz Eduardo Guarino de Vasconcelos, Leonardo B. Oliveira, Gabriel Guimaraes, and Felipe Ayres 31 An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework Adler Diniz de Souza, Rodrigo Duarte Seabra, Juliano Marinho Ribeiro, and Lucas Eduardo da Silva Rodrigues
Part IV Agile Software Testing and Development
32 Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects Laurie Butgereit 33 Alignment of Requirements and Testing in Agile: An Industrial Experience Alessio Bucaioni. Antonio Cicchetti. Federico Ciccozzi, Manvisha Kodali, and Mikael Sjodin 34 Health Care Information Systems: A Crisis Approach Daniela America da Silva, Gildarcio Sousa Goncalves, Samara Cardoso dos Santos, Victor Ulisses Pugliese, Julhio Navas, Rodrigo Monteiro de Barros Santana, Filipe Santiago Queiroz, Luiz Alberto Vieira Dias, Adilson Marques da Cunha, and Paulo Marcelo Tasinaffo 35 Using Correct-by-Const ruction Software Agile Development Rafael Augusto Lopes Shigemura, Gildarcio Sousa Goncalves, Luiz Alberto Vieira Dias, Paulo Marcelo Tasinaffo. Adilson Marques da Cunha. Luciana Sayuri Mizioka, Leticia Hissae Yanaguya, and Victor Ulisses Pugliese 36 Service-Centered Operation Methodology (MOCA) Application Supported by Computer Science to Improve Continuously Care Quality in Public Services Denis Avila Montini, Gustavo Ravanhani Matuck, Danilo Douradinho Fernandes, Alessandra Avila Montini, Fernando Graton, Plinio Ripari, and Flavia de Sousa Pinto 37 Improving Agile Software Development with Domain Ontologies Pedro Lopes de Souza, Antonio Francisco do Prado. Wanderley Lopes de Souza, Sissi Marilia dos Santos Forghieri Pereira, and Luis Ferreira Pires 38 A Stratified Sampling Algorithm for Artificial Neural Networks Danilo Douradinho Fernandes, Gustavo Ravanhani Matuck, Denis Avila Montini, Luiz Alberto Vieira Dias, and Alessandra Avila Montini
Part V Data Mining/Machine Learning
39 Mining ENADE Data from the Ulbra Network Institution Heloise Acco Tives Leao, Edna Dias Canedo, Marcelo Ladeira, and Fabiano Fagundes 40 Fault Diagnostic of Variance Shifts in Clinical Monitoring Using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) Nadeera Gnan Tilshan Gunaratne, Mali Abdollahian, and Shamsul Huda 41 Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise Strauss Carvalho Cunha. Emanuel Mineda Cameiro, Lineu Fernando Stege Mialaret, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha 42 Cross-Language Approach for Sentiment Classification in Brazilian Portuguese with ConvNets Rafael P. da Silva, Flavio A. O. Santos, Filipe B. do Nascimento, and Hendrik T. Macedo 43 Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and Their Meaning in Satellite Image Time Series C. R. Silveira Jr., J. R. Cecatto, M. T. P. Santos, and M. X. Ribeiro 44 DcRis: Information System Supporting the Prediction of Default Risk in Companies Claudio Augusto Silveira Lelis, and Andre Luiz Silveira Lopardi 45 Taking a Steppe Towards Optimizing Note-Taking Software by Creation of a Note Classification Algorithm Daniela Zieba. Wren Jenkins, Michael Galloway, and Jean-Luc Houle 46 Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics Pedro Fernandes, Alexandre С. B. Ramos, Danilo Pereira Roque, and Marcelo Santiago de Sousa 47 A Model for Hour-Wise Prediction of Mobile Device Energy Availability Mathias Longo, Cristian Mateos, and Alejandro Zunino 48 Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model Nuwee Wiwatwattana, Sirikarn Chareonnivassakul, Noppon Maleerutmongkol, and Chavin Charoenvitvorakul 49 A Traffic Light Recognition Device Thiago Almeida, Hendrik Macedo, and Leonardo Matos 50 An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment Ronaldo de Matos Nascimento Filho, Glauco de Figueiredo Cameiro and Miguel Monteiro 51 Reproducible Research in Document Analysis and Recognition Jorge Ramon Fonseca Cacho and Kazem Taghva 52 Music Genre Classification Using Data Mining and Machine Learning Nimesh Ramesh Prabhu, James Andro-Vasko, Doina Bein, and Wolfgang Bein 53 Improving Word Representations Using Paraphrase Dataset Flavio Arthur O. Santos and Hendrik T. Macedo 54 A Initial Experimental К valuation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interaetions Breno Santana Santos, Methanias Cola^o Junior, and Janisson Gois de Souza 55 Dual Long Short-Term Memory Networks for Sub-Character Representation beaming Han He, Lei Wu. Xiaokun Yang. Hua Yan Zhimin Gao, Yi Feng, and George Townsend 56 Business Intelligence Dashboard Application for Insurance Cross Selling Jagan Mohan Narra, Doina Bein. and Vlad Popa 57 Speech Features Analysis for Tone Language Speaker Discrimination Systems Mercy Edoho, Moses Ekpenyong, and Udoinyang Inyang 58 Selection of Transformations of Continuous Predictors in Logistic Regression Michael Chang, Rohan J. Dalpatadu. and Ashok K. Singh
Part VI Software Engineering
59 A Generic Approach to Efficiently Parallelize Legacy Sequential Software Andreas Granholm and Federico Ciccozzi 60 Clustering and Combinatorial Methods for Test Suite Prioritization of Gl'I and Web Applications Dmitry' Nurmuradov. Renee Bryce, Shraddha Piparia, and Barrett Bryant 61 A Timed Petri Net Model to Specify Scenarios of Video Games Franciny M. Barreto. Joslaine Cristina Jeske de Freitas, and Stephane Julia 62 Survey of Biometric Techniques for Automotive Applications Maria Villa. Mikhail Gofman. and Sinjini Mitra 63 A Survey on Adoption Good Practices for ICT Governance at Enhanced Organizations Marianne Batista Diniz da Silva, Alef Menezes dos Santos, Michel dos Santos Soares, Rogerio Patricio Chagas do Nascimento. and Isabel Dillmann Nunes 64 Budget and User Eeedback Control Strategy-Based PRMS Scenario Web Application Rui Wu. Jose Painumkal, Sergiu M. Dascalu, and Frederick C. Harris Jr. 65 A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules Carlos Eugenio P da Purifica^oand Paulo Caetano da Silva 66 An Approach Based on Possibilistic WorkElow Nets to Model Multiplayer Video Games Franciny M. Barreto, Leiliane Pereira de Rezende. and Stephane Julia 67 A Requirements Engineering-Based Approach for Evaluating Security Requirements Engineering Methodologies Sravani Teja Bulusu. Romain Laborde. Ahmad Samer Wazan, Francois Barrere, and Abdelmalek Benzekri 68 Increasing the Prediction Quality of Software Defective Modules with Automatic Feature Engineering Alexandre Moreira Nascimento, Vinfcius Veloso de Melo, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha
Part VII High Performance Computing Architectures
69 NSF Noyce Recruitment and Mentorship Fangyang Shen, Janine Roccosalvo, Jun Zhang, Yanqing Ji, Yang Yi, and Lieselle Trinidad 70 Mining Associations Between Two Categories Using Unstructured Text Data in Cloud Yanqing Ji, Yun Tian, Fangyang Shen. and John Tran 71 A Note on Computational Science Curriculum Jun Zhang and Fangyang Shen 72 Development of a Local Cloud-Based Bioinformatics Architecture Chandler Staggs and Michael Galloway Part VIII Computer Vision, Image Processing/Analysis 73 A Computer Vision Based Algorithm for Obstacle Avoidance Wander Mendes Martins, Rafael Gomes Braga, Alexandre Carlos Brandao Ramos, and Felix Mora-Camino 74 The ST-Vis Tool for SpatioTemporal Visualization Ana Paula S. Braatz Vieira. Rafael S. Joao, Luciana A. S. Romani, and Marcela X. Ribeiro 75 Detection of Early Gastric Cancer from Endoscopic Images Using Wavelet Transform Modulus Maxima Yuya Tanaka and Teruya Minamoto 76 Detection Method of Early Esophageal Cancer from Endoscopic Image Using Dyadic Wavelet Transform and Four-Layer Neural Network Hajime Omura and Teruya Minamoto 77 Study of Specific Location of Exhaustive Matching in Order to Improve the Optical EIow Estimation Vanel Lazcano 78 Solar-Powered UAV Platform System: A Case Study for Ground Change Detection in BRIC Countries Alexandre С. B. Ramos, Elcio H. Shiguemori, Sergey Serokhvostov, P. K. Gupta, Lunlong Zhong, and Xiao Bing Hu
Part IX Health. Bioinforniatics, Pattern Detection and Optimization
79 Benefits of Establishing Makers paces in Distributed Development Environment Basit Shahzad and Kashif Saleem 80 Semantic Description of Healthcare Devices to Enable Data Integration Antonella Carbonaro, Filippo Piccinini. and Roberto Reda 81 Applying Transfer Learning to QSAR Regression Models Rodolfo S. Simoes, Patricia R. Oliveira, Kathia M. Honorio, and Clodoaldo A. M. Lima 82 Investigating the Recognition of Non-articulatory Sounds by Using Statistical Tests and Support Vector Machine Francisco Carlos M. Souza, Alinne C. Correa Souza, Gilberto M. Nakamura, M. D. Soares, Patricia Pupin Mandra. and Alessandra A. Macedo 83 A Complete Diabetes Management and Care System Claudio Augusto Silveira Lelis and Renan Motta 84 On the Use of van der Pauw Technique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IEC) with Extension to Other E-Stim Monitoring Lawrence V. Hmurcik. Sarosh Patel, and Navarun Gupta
Part X Potpourri
85 Smart Lighting Controlling System: Case Study of Yarmouk University Museum Mohammed Akour, Ziad AI Saad, Abd Rahman A1 Asmar, and Abd A1 Rahem Jar rah 86 Incremental Topology Generated for ANN: A Case Study on a Helicopter’s Flight Simulation Pedro Fernandes, Jr., Alexandre С. B. Ramos, Danilo Pereira Roque, and Marcelo Santiago de Sousa 87 Degree Aware Triangulation of Annular Regions Laxmi P. Gewali and Bhaikaji Gurung 88 Heuristic Approaches for the Open-Shop Scheduling Problem Wissam Marrouche and Haidar M. Harmanani 8‘J Continuous State Power-Down Systems for Renewable Energy Management James Andro-Vasko, Surya Ravali Avasarala, and Wolfgang Bein 90 Extracting Timing Models from Component-Based Multi-Criticality Vehicular Embedded Systems Saad Mubeen, Mattias Galnander, John Lundback, and Kurt-Lennart Lundback
Part XI Short Papers
91 BIG IoT: Interconnecting IoT Platforms from Different Domains—First Success Story Thomas Jell, Claudia Baumgartner, Ame Broring, and Jelena Mitic 92 Cross-Cultural Perspective of E-Commerce Website Usability Requirements: Through the Lens of Individual's Perception Jay Jung, Jae Min Jung, and Sonya Zhang 93 Methods of Ensuring the Reliability and Fault Tolerance of Information Systems Askar Boranbayev, Seilkhan Boranbayev, Kuanysh Yersakhanov, Assel Nurusheva. and Roman Taberkhan 94 Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise Strauss Carvalho Cunha. Emanuel Mineda Cameiro, Lineu Fernando Stege Mialaret, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha 95 Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly J. L. C. Mello, D. M. T. Souza, С. M. Tamaki, V. A. C. Galhardo, D. F. Veiga, and A. С. B. Ramos 96 A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company Strauss Carvalho Cunha. Emanuel Mineda Cameiro, Lineu Fernando Stege Mialaret, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha 97 Confidentiality, Integrity and Availability in Electronic Health Records: An Integrative Review Mojgan Azadi. Hossein Zare, and Mohammad Jalal Zare 98 Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus) Hossein Zare, Peter Olsen, Mohammad Jalal Zare, and Mojgan Azadi 99 Method of Processing Big Data Seilkhan Boranbayev, Assulan Nurkas, Yersultan Tulebayev, and Baktygeldi Tashtai 100 Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan Askar Boranbayev, Ruslan Baidyussenov, and Mikhail Mazhitov 101 Modified Huffman Code for Bandwidth Optimization Through Lossless Compression Alexander Hansen and Mark C. Lewis
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.