Information Technology - New Generations
15th International Conference on Information Technology
Herausgegeben:Latifi, Shahram
Information Technology - New Generations
15th International Conference on Information Technology
Herausgegeben:Latifi, Shahram
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology - New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education.
Andere Kunden interessierten sich auch für
- Information Technology - New Generations111,99 €
- ITNG 2022 19th International Conference on Information Technology-New Generations181,89 €
- ITNG 2022 19th International Conference on Information Technology-New Generations125,99 €
- 16th International Conference on Information Technology-New Generations (ITNG 2019)111,99 €
- Information Technology in Disaster Risk Reduction37,99 €
- Digitalisation, Innovation, and Transformation74,99 €
- Cloud Computing and Security38,99 €
-
-
-
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology - New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education.
Produktdetails
- Produktdetails
- Advances in Intelligent Systems and Computing 738
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-319-77027-7
- 1st ed. 2018
- Seitenzahl: 840
- Erscheinungstermin: 13. April 2018
- Englisch
- Abmessung: 285mm x 215mm x 51mm
- Gewicht: 2278g
- ISBN-13: 9783319770277
- ISBN-10: 3319770276
- Artikelnr.: 50889911
- Advances in Intelligent Systems and Computing 738
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-319-77027-7
- 1st ed. 2018
- Seitenzahl: 840
- Erscheinungstermin: 13. April 2018
- Englisch
- Abmessung: 285mm x 215mm x 51mm
- Gewicht: 2278g
- ISBN-13: 9783319770277
- ISBN-10: 3319770276
- Artikelnr.: 50889911
Shahram Latifi, PhD, P.E., is Professor of Electrical and Computer Engineering and Co-director of Center for Information Technology, College of Engineering at the University of Nevada, Las Vegas
Part I Cybersecurity.- Safeguarding Personal Health Information: Case Study.- Cybersecurity as People Powered Perpetual Innovation.- Performance Study of the Impact of Security on 802.11ac Networks.- Training Neural Tensor Networks with the Never Ending Language Learner.- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework.- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan.- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network.- A Virtual Animated Commentator Architecture for Cybersecurity Competitions.- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features.- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach).- A Self Proxy Signature Scheme over NTRU Lattices.- Towards an Ontology of Security Assessment: a core model proposal.- Integration of Mobile Forensic Tool Capabilities.- Deep Packet Inspection: A Key Issue for Network Security.- What Petya/NotPetya Ransomware is and What its Remidiations are.- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform.- New Techniques for Public Key Encryption with Sender Recovery.- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa.- Protecting Personal Data with Blockchain Technology.- The Role of CAE-CDE in Cybersecurity Education for Workforce Development.- Software Optimizations for DES.- Part II Networking and Wireless Communications.- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment.- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks.- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges.- A Dual canister medicine IoT Dispenser.- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks.- Denial of service attacks inwireless sensor networks with proposed countermeasures.- Part III Education and Technology.- Internet-Based Education: A New Milestone for Formal Language and Automata Courses.- Teaching Communication Management in Software Projects through Serious Educational Games.- Gamification applied in the teaching of agile Scrum methodology.- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework .- Part IV Agile Software Testing and Development.- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects.- Alignment of Requirements and Testing in Agile: an Industrial Experience.- Health Care Information Systems: A Crisis Approach.- Using Correct-by-Construction Software Agile Development.- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services .- Improving Agile Software Development with Domain Ontologies.- A Stratified Sampling Algorithmfor Artificial Neural Networks.- Part V Data Mining/Machine Learning.- Mining ENADE Data from the Ulbra Network Institution.- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA).- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise.- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets.- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series.- DeRis: Information system supporting the prediction of default risk in companies.- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm.- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics.- A model for hour-wise prediction of mobile device energy availability.- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model.- A Traffic Light Recognition Device.- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment.- Reproducible Research in Document Analysis and Recognition.- Music Genre Classification using Data Mining and Machine Learning.- Improving word representations using Paraphrase dataset.- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions.- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning.- Business Intelligence Dashboard Application for Insurance Cross Selling.- Speech Features Analysis for Tone Language Speaker Discrimination Systems.- Selection of Transformations of Continuous Predictors in Logistic Regression.- Part VI Software Engineering.- A Generic Approach to Efficiently Parallelize Legacy Sequential Software.- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications.- A Timed Petri NetModel to Specify Scenarios of Video Games.- Survey of Biometric Techniques for Automotive Applications.- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations.- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application.- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules.- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games.- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies.- Increasing the prediction quality of software defective modules with automatic feature engineering.- Part VII High Performance Computing Architectures.- NSF Noyce Recruitment and Mentorship.- Mining Associations between Two Categories using Unstructured Text Data in Cloud.- A Note on Computational Science Curriculum.- Development of a Local Cloud-Based Bioinformatics Architecture.- Part VIII Computer Vision, Image Processing/Analysis.- AComputer Vision Based Algorithm for Obstacle Avoidance.- The ST-Vis tool for SpatioTemporal Visualization.- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima.- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network.- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation.- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries.- Part IX Health, Bioinformatics, Pattern Detection and Optimization.- Benefits of Establishing Makerspaces in Distributed Development Environment.- Semantic Description of Healthcare Devices to Enable Data Integration.- Applying transfer learning to QSAR regression models.- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine.- A Complete Diabetes Management and Care System.- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring.- Part X Potpourri.- Smart Lighting Controlling System: Case Study of Yarmouk University Museum.- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation.- Degree Aware Triangulation of Annular Regions.- Heuristic Approaches for the Open-Shop Scheduling Problem.- Continuous State Power-down Systems for Renewable Energy Management.- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems.- Part XI Short Papers.- Customer services management and satisfaction of Internet-related banking of First National Bank.- BIG IoT - Interconnecting IoT Platforms from different domains - First success story.- Cross-Cultural Perspective of E-Commerce.- Website Usability Requirements: Through the Lens of Individual's Perception.- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems.- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise.- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly.- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company.- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review.- Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus).- Method of Processing Big Data.- Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan.- Modified Human Code for Bandwidth Optimization through Lossless Compression.- Index.
Part I Cybersecurity.- Safeguarding Personal Health Information: Case Study.- Cybersecurity as People Powered Perpetual Innovation.- Performance Study of the Impact of Security on 802.11ac Networks.- Training Neural Tensor Networks with the Never Ending Language Learner.- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework.- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan.- Evaluating Cyber Threats to the United Kingdom’s National Health Service (NHS) Spine Network.- A Virtual Animated Commentator Architecture for Cybersecurity Competitions.- Malicious Software Classification using VGG16 Deep Neural Network’s Bottleneck Features.- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach).- A Self Proxy Signature Scheme over NTRU Lattices.- Towards an Ontology of Security Assessment: a core model proposal.- Integration of Mobile Forensic Tool Capabilities.- Deep Packet Inspection: A Key Issue for Network Security.- What Petya/NotPetya Ransomware is and What its Remidiations are.- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform.- New Techniques for Public Key Encryption with Sender Recovery.- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa.- Protecting Personal Data with Blockchain Technology.- The Role of CAE-CDE in Cybersecurity Education for Workforce Development.- Software Optimizations for DES.- Part II Networking and Wireless Communications.- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment.- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks.- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges.- A Dual canister medicine IoT Dispenser.- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks.- Denial of service attacks inwireless sensor networks with proposed countermeasures.- Part III Education and Technology.- Internet-Based Education: A New Milestone for Formal Language and Automata Courses.- Teaching Communication Management in Software Projects through Serious Educational Games.- Gamification applied in the teaching of agile Scrum methodology.- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework .- Part IV Agile Software Testing and Development.- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects.- Alignment of Requirements and Testing in Agile: an Industrial Experience.- Health Care Information Systems: A Crisis Approach.- Using Correct-by-Construction Software Agile Development.- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services .- Improving Agile Software Development with Domain Ontologies.- A Stratified Sampling Algorithmfor Artificial Neural Networks.- Part V Data Mining/Machine Learning.- Mining ENADE Data from the Ulbra Network Institution.- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA).- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise.- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets.- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series.- DeRis: Information system supporting the prediction of default risk in companies.- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm.- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics.- A model for hour-wise prediction of mobile device energy availability.- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model.- A Traffic Light Recognition Device.- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment.- Reproducible Research in Document Analysis and Recognition.- Music Genre Classification using Data Mining and Machine Learning.- Improving word representations using Paraphrase dataset.- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions.- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning.- Business Intelligence Dashboard Application for Insurance Cross Selling.- Speech Features Analysis for Tone Language Speaker Discrimination Systems.- Selection of Transformations of Continuous Predictors in Logistic Regression.- Part VI Software Engineering.- A Generic Approach to Efficiently Parallelize Legacy Sequential Software.- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications.- A Timed Petri NetModel to Specify Scenarios of Video Games.- Survey of Biometric Techniques for Automotive Applications.- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations.- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application.- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules.- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games.- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies.- Increasing the prediction quality of software defective modules with automatic feature engineering.- Part VII High Performance Computing Architectures.- NSF Noyce Recruitment and Mentorship.- Mining Associations between Two Categories using Unstructured Text Data in Cloud.- A Note on Computational Science Curriculum.- Development of a Local Cloud-Based Bioinformatics Architecture.- Part VIII Computer Vision, Image Processing/Analysis.- AComputer Vision Based Algorithm for Obstacle Avoidance.- The ST-Vis tool for SpatioTemporal Visualization.- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima.- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network.- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation.- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries.- Part IX Health, Bioinformatics, Pattern Detection and Optimization.- Benefits of Establishing Makerspaces in Distributed Development Environment.- Semantic Description of Healthcare Devices to Enable Data Integration.- Applying transfer learning to QSAR regression models.- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine.- A Complete Diabetes Management and Care System.- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring.- Part X Potpourri.- Smart Lighting Controlling System: Case Study of Yarmouk University Museum.- Incremental Topology Generated for ANN A Case Study on a Helicopter’s Flight Simulation.- Degree Aware Triangulation of Annular Regions.- Heuristic Approaches for the Open-Shop Scheduling Problem.- Continuous State Power-down Systems for Renewable Energy Management.- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems.- Part XI Short Papers.- Customer services management and satisfaction of Internet-related banking of First National Bank.- BIG IoT – Interconnecting IoT Platforms from different domains - First success story.- Cross-Cultural Perspective of E-Commerce.- Website Usability Requirements: Through the Lens of Individual’s Perception.- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems.- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise.- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly.- A Classifier Evaluation for Payments’ Default Predictions in a Brazilian Retail Company.- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review.- Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus).- Method of Processing Big Data.- Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan.- Modified Human Code for Bandwidth Optimization through Lossless Compression.- Index.
Part I Cybersecurity.- Safeguarding Personal Health Information: Case Study.- Cybersecurity as People Powered Perpetual Innovation.- Performance Study of the Impact of Security on 802.11ac Networks.- Training Neural Tensor Networks with the Never Ending Language Learner.- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework.- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan.- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network.- A Virtual Animated Commentator Architecture for Cybersecurity Competitions.- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features.- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach).- A Self Proxy Signature Scheme over NTRU Lattices.- Towards an Ontology of Security Assessment: a core model proposal.- Integration of Mobile Forensic Tool Capabilities.- Deep Packet Inspection: A Key Issue for Network Security.- What Petya/NotPetya Ransomware is and What its Remidiations are.- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform.- New Techniques for Public Key Encryption with Sender Recovery.- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa.- Protecting Personal Data with Blockchain Technology.- The Role of CAE-CDE in Cybersecurity Education for Workforce Development.- Software Optimizations for DES.- Part II Networking and Wireless Communications.- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment.- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks.- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges.- A Dual canister medicine IoT Dispenser.- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks.- Denial of service attacks inwireless sensor networks with proposed countermeasures.- Part III Education and Technology.- Internet-Based Education: A New Milestone for Formal Language and Automata Courses.- Teaching Communication Management in Software Projects through Serious Educational Games.- Gamification applied in the teaching of agile Scrum methodology.- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework .- Part IV Agile Software Testing and Development.- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects.- Alignment of Requirements and Testing in Agile: an Industrial Experience.- Health Care Information Systems: A Crisis Approach.- Using Correct-by-Construction Software Agile Development.- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services .- Improving Agile Software Development with Domain Ontologies.- A Stratified Sampling Algorithmfor Artificial Neural Networks.- Part V Data Mining/Machine Learning.- Mining ENADE Data from the Ulbra Network Institution.- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA).- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise.- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets.- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series.- DeRis: Information system supporting the prediction of default risk in companies.- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm.- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics.- A model for hour-wise prediction of mobile device energy availability.- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model.- A Traffic Light Recognition Device.- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment.- Reproducible Research in Document Analysis and Recognition.- Music Genre Classification using Data Mining and Machine Learning.- Improving word representations using Paraphrase dataset.- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions.- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning.- Business Intelligence Dashboard Application for Insurance Cross Selling.- Speech Features Analysis for Tone Language Speaker Discrimination Systems.- Selection of Transformations of Continuous Predictors in Logistic Regression.- Part VI Software Engineering.- A Generic Approach to Efficiently Parallelize Legacy Sequential Software.- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications.- A Timed Petri NetModel to Specify Scenarios of Video Games.- Survey of Biometric Techniques for Automotive Applications.- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations.- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application.- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules.- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games.- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies.- Increasing the prediction quality of software defective modules with automatic feature engineering.- Part VII High Performance Computing Architectures.- NSF Noyce Recruitment and Mentorship.- Mining Associations between Two Categories using Unstructured Text Data in Cloud.- A Note on Computational Science Curriculum.- Development of a Local Cloud-Based Bioinformatics Architecture.- Part VIII Computer Vision, Image Processing/Analysis.- AComputer Vision Based Algorithm for Obstacle Avoidance.- The ST-Vis tool for SpatioTemporal Visualization.- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima.- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network.- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation.- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries.- Part IX Health, Bioinformatics, Pattern Detection and Optimization.- Benefits of Establishing Makerspaces in Distributed Development Environment.- Semantic Description of Healthcare Devices to Enable Data Integration.- Applying transfer learning to QSAR regression models.- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine.- A Complete Diabetes Management and Care System.- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring.- Part X Potpourri.- Smart Lighting Controlling System: Case Study of Yarmouk University Museum.- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation.- Degree Aware Triangulation of Annular Regions.- Heuristic Approaches for the Open-Shop Scheduling Problem.- Continuous State Power-down Systems for Renewable Energy Management.- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems.- Part XI Short Papers.- Customer services management and satisfaction of Internet-related banking of First National Bank.- BIG IoT - Interconnecting IoT Platforms from different domains - First success story.- Cross-Cultural Perspective of E-Commerce.- Website Usability Requirements: Through the Lens of Individual's Perception.- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems.- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise.- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly.- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company.- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review.- Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus).- Method of Processing Big Data.- Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan.- Modified Human Code for Bandwidth Optimization through Lossless Compression.- Index.
Part I Cybersecurity.- Safeguarding Personal Health Information: Case Study.- Cybersecurity as People Powered Perpetual Innovation.- Performance Study of the Impact of Security on 802.11ac Networks.- Training Neural Tensor Networks with the Never Ending Language Learner.- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework.- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan.- Evaluating Cyber Threats to the United Kingdom’s National Health Service (NHS) Spine Network.- A Virtual Animated Commentator Architecture for Cybersecurity Competitions.- Malicious Software Classification using VGG16 Deep Neural Network’s Bottleneck Features.- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach).- A Self Proxy Signature Scheme over NTRU Lattices.- Towards an Ontology of Security Assessment: a core model proposal.- Integration of Mobile Forensic Tool Capabilities.- Deep Packet Inspection: A Key Issue for Network Security.- What Petya/NotPetya Ransomware is and What its Remidiations are.- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform.- New Techniques for Public Key Encryption with Sender Recovery.- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa.- Protecting Personal Data with Blockchain Technology.- The Role of CAE-CDE in Cybersecurity Education for Workforce Development.- Software Optimizations for DES.- Part II Networking and Wireless Communications.- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment.- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks.- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges.- A Dual canister medicine IoT Dispenser.- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks.- Denial of service attacks inwireless sensor networks with proposed countermeasures.- Part III Education and Technology.- Internet-Based Education: A New Milestone for Formal Language and Automata Courses.- Teaching Communication Management in Software Projects through Serious Educational Games.- Gamification applied in the teaching of agile Scrum methodology.- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework .- Part IV Agile Software Testing and Development.- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects.- Alignment of Requirements and Testing in Agile: an Industrial Experience.- Health Care Information Systems: A Crisis Approach.- Using Correct-by-Construction Software Agile Development.- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services .- Improving Agile Software Development with Domain Ontologies.- A Stratified Sampling Algorithmfor Artificial Neural Networks.- Part V Data Mining/Machine Learning.- Mining ENADE Data from the Ulbra Network Institution.- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA).- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise.- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets.- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series.- DeRis: Information system supporting the prediction of default risk in companies.- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm.- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics.- A model for hour-wise prediction of mobile device energy availability.- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model.- A Traffic Light Recognition Device.- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment.- Reproducible Research in Document Analysis and Recognition.- Music Genre Classification using Data Mining and Machine Learning.- Improving word representations using Paraphrase dataset.- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions.- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning.- Business Intelligence Dashboard Application for Insurance Cross Selling.- Speech Features Analysis for Tone Language Speaker Discrimination Systems.- Selection of Transformations of Continuous Predictors in Logistic Regression.- Part VI Software Engineering.- A Generic Approach to Efficiently Parallelize Legacy Sequential Software.- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications.- A Timed Petri NetModel to Specify Scenarios of Video Games.- Survey of Biometric Techniques for Automotive Applications.- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations.- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application.- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules.- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games.- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies.- Increasing the prediction quality of software defective modules with automatic feature engineering.- Part VII High Performance Computing Architectures.- NSF Noyce Recruitment and Mentorship.- Mining Associations between Two Categories using Unstructured Text Data in Cloud.- A Note on Computational Science Curriculum.- Development of a Local Cloud-Based Bioinformatics Architecture.- Part VIII Computer Vision, Image Processing/Analysis.- AComputer Vision Based Algorithm for Obstacle Avoidance.- The ST-Vis tool for SpatioTemporal Visualization.- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima.- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network.- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation.- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries.- Part IX Health, Bioinformatics, Pattern Detection and Optimization.- Benefits of Establishing Makerspaces in Distributed Development Environment.- Semantic Description of Healthcare Devices to Enable Data Integration.- Applying transfer learning to QSAR regression models.- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine.- A Complete Diabetes Management and Care System.- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring.- Part X Potpourri.- Smart Lighting Controlling System: Case Study of Yarmouk University Museum.- Incremental Topology Generated for ANN A Case Study on a Helicopter’s Flight Simulation.- Degree Aware Triangulation of Annular Regions.- Heuristic Approaches for the Open-Shop Scheduling Problem.- Continuous State Power-down Systems for Renewable Energy Management.- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems.- Part XI Short Papers.- Customer services management and satisfaction of Internet-related banking of First National Bank.- BIG IoT – Interconnecting IoT Platforms from different domains - First success story.- Cross-Cultural Perspective of E-Commerce.- Website Usability Requirements: Through the Lens of Individual’s Perception.- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems.- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise.- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly.- A Classifier Evaluation for Payments’ Default Predictions in a Brazilian Retail Company.- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review.- Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus).- Method of Processing Big Data.- Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan.- Modified Human Code for Bandwidth Optimization through Lossless Compression.- Index.