image004

IEEE Conference Record No. #37958

Use Internet Explorer only, other browsers may not show the site correctly

                

AIMS2015

image004

 IEEE Third International Conference on

Artificial Intelligence, Modelling and Simulation

 

Kota Kinabalu, Sabah (Malaysia) 2 - 4 December

Hosting university: UMS, Universiti Malaysia Sabah

Click here to view AIMS2013 , AIMS2014 Proceedings in IEEE online Digital Library I-Xplore

Explore Borneo: http://www.jodisjungleadventures.com/HOME_2.html

layout_top

 

More on Kota Kinabalu

 

 

Flights & Travel

 

logoAiRU_UMS

download

www.ums.edu.my

 

 

 

 

Keynote, Tutorial &

Exhibition Speakers

 

Important Dates

Submission: see above

 

Notification

Starts: from 1 October 2015

 

Final Upload into EDAS for checking &

 Registration

(Payment):

31 October 2015

Credit Card on EDAS

 

Camera-ready

to CPS server & copyright form:

1 November 2015

 

Conference Chairs:

Dr Ismail Saad, UMS

Dr Athanasios Pantelous

University of Liverpool

 

Programme Chairs:

Dr. Khairul Anuar Mohamad, UMS

Dr. Lau Hui Keng, UMS

Dr Zuwairie Ibrahim, UMP

Dr Adam Brentnall, Queen Mary, London University

Dr Alessandra Orsoni

Kingston University

 

Local Arrangements/

Venue Chairs:

Dr. Mohd Hanafi Ahmad Hijazi, UMS

Dr. Chin Kim On, UMS

Mr Kenneth Teo. UMS

 

Advisory/Honorary Chairs

Prof Jasmy Yunus, UTM

Prof Borhanuddin Mohd Bin Ali, UPM

Prof Mahamod Ismail UKM

Prof Philip Sallis, AUT

    New Zealand

Prof Rosni Abdullah, USM

Prof Paulus Rihardjo, UNPAR

   Indonesia

Prof Rosalam Sarbatly, UMS

 

General Chair:

David Al-Dabass

 

General Co-Chair:

Ajith Abraham

 

 

EUROSIM

Liaison Chair:

Alessandra Orsoni

Paper submission deadline, extended to 5 November 2015, now closed.

 

Best Papers and IJSSST selected

 

Papers going to Publication

Program

ISBN and Pages numbers

Full Program with Paper Abstracts

Attendees

View Proceedings CD online, use Internet Explorer to see full paper content

Opening Session

 

Conference Venue: Le Meridien Hotel, Kota Kinabalu.

 

Hotels nearby:

Le Hotel: www.lehotel.com.my, email Ms Lee Yuen Wong to book: leeyuen@hopan.net, from RM98

D Borneo Hotel: www.dborneohotel.com, email to book: info@dborneohotel.com, from RM150

Myne Hotel: www.myne.com.my, email to book: inquiryhotel@myne.com.my, from RM160

Marina Court Resort Condominium, email to book: mcrc@promenade.com.my

Promenade Hotel: www.promenade.com.my

 

 

Write your Paper using these Templates:

 

Word template (MS Word .doc format)

PDF template (PDF format)

Latex template (Latex format)

 

Then submit it through EDAS: http://edas.info

Paper Registration: Payment

 

 

Papers are invited on any aspect of the development of concepts, principles, algorithms, their modelling and simulation in Artificial Intelligence and their applications in all areas relevant to system engineering, science, technology, business, management and industry to be presented at AIMS2015. Conference content will be submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.  Selected papers will be submitted for publication in the International Journal of Simulation: Systems, Science & Technology, IJSSST (http://ijssst.info). The event provides authors with an outstanding opportunity for networking and presenting their work at a top quality international conference.

 

AIMS2015 will be held over 3 day period in Kota Kinabalu, state of Sabah, Island of Borneo, Malaysia.

 

Tracks/Themes

- Algorithms, principles and architectures for Artificial Intelligence (AI)

- emulation to exhibit Natural Intelligence (NI) behaviour

- Neural Networks

- Fuzzy Systems

- Evolutionary Computation

- Autonomous Mental Development

- Adaptive Dynamic Programming and Reinforcement Learning

- Computational Finance and Economics

- Data Mining

- Games, Virtual Reality and Visualization

- Emergent Technologies

- AI Applications

- Intelligent Systems

- Hybrid Intelligent Systems

- Soft Computing and Hybrid Soft Computing

- Computational Intelligence

- Systems Intelligence

- Intelligence Systems

- Control of Intelligent Systems

- Control Intelligence

- e-Science and e-Systems

- Robotics, Cybernetics, Engineering, Manufacturing and Control

- Methodologies, Tools and Operations Research

- Bio-informatics and Bio-Medical Simulation

- Discrete Event and Real Time Systems

- Image, Speech and Signal Processing

- Industry, Business and Management

- Human Factors and Social Issues

- Energy, Power Generation and Distribution

 

- Transport, Logistics, Harbour, Shipping and Marine Simulation

- Supply Chain Management

- Virtual Reality, Visualization and Computer Games

- Parallel and Distributed Architectures and Systems

- Internet Modelling, Semantic Web and Ontologies

- Mobile/Ad hoc wireless networks, mobicast, sensor placement, target tracking

- Performance Engineering of Computer & Communication Systems

- Circuits, Sensors and Devices

Suggested topics (other topics are also welcome): Artificial Intelligence methodology and practice, languages, tools and techniques. Models and modelling tools. Data/object bases. Analytical and statistical tools. Simulators and simulation hardware, training simulators. Integration of simulation with concurrent engineering, integrated design and simulation systems. AI, intelligent systems, agent-based simulation, decision support systems, philosophical issues, analogies, metaphors, knowledge modelling, acquisition and synthesis of new knowledge/models, intelligent/adaptive behaviour, man/machine interaction, control systems. Parallel and distributed simulation, discrete event systems. Artificial neural networks, computational intelligence.

 

Applications: aerospace; remote sensing; electronic circuits and systems; communication and networks; business; management; finance; economics; leisure, games, war/conflict/rebellion modelling; psychology, cognitive functions, behaviour, emotion, subjectivity; humanities, literature, semantics modelling/dynamics; biology; medicine; public health; energy, power generation and distribution, manufacturing; planning; control; robotics; measurement; monitoring; energy; safety critica1 systems; transportation; structural mechanics and civil engineering, oil and gas; education and training; military.

 

Exhibitors: manufacturers of software and hardware, publishers, etc., are invited to apply to exhibit their products.

 

The conference is organised and sponsored by UK Simulation Society/Asia Modelling and Simulation Section, and Technically-Co-Sponsored by IEEE Malaysia section and IEEE Region 8. Patrons, Promoters and supporters of the conference include: University of Malaysia in Sabah, University of Malaysia in Pahang, University of Technology Malaysia, Nottingham Trent University, IEEE UK & RI Computer Chapter, EUROSIM and European Council for Modelling & Simulation.

 

Submission Guidelines

Submissions must be original, unpublished work containing new and interesting results that demonstrate current research in all areas of artificial intelligence, modelling and simulation and their applications in science, technology, business and commerce. Full papers only, 6 pages maximum, are accepted for review.

      

Submission implies the willingness of at least one of the authors to register and present the paper.

 

Paper Submission: AIMS2015 is using EDAS for submission, paper processing and registration, authors need to:

- create an account with EDAS by clicking on the link below

- open the list of conferences managed by EDAS & find AIMS2015

- click on Submit button on the right to enter your paper title & abstract

- upload file.

 

Click here to submit paper via EDAS

 

Paper Templates:

Word template (MS Word .doc format)

PDF template (PDF format)

Latex template (Latex format)

 

Authors of the best papers will be invited to revise and extend their work for publication in a special issue of the International Journal of Simulation: Systems, Science and Technology.

Conference website: http://aims2015.info

 

Attendance and presentation  

1. Absence does not affect publication in the CD, it only affects submission and placement in I-Xplore (about 6 to 12 months after the conference).

2. Authors who find it impossible to attend but still wish their paper to be submitted to I-Xplore must upload their Presentation file to EDAS for review by the committee to approve submission to I-Xplore. The author must explain the reasons for absence in the first slide after the title slide with the name and email address of head of department or professor to confirm and support the reasons.

3. Authors who state they will attend but do not show up will not have the proceedings CD sent to them nor will their paper be submitted to I-Xplore.

4. The presentation program must be accurate to avoid time waste.

 

IEEE-Xplore: a paper will not be submitted to IEEE-Xplore if it suffers from one or more of the following problems:

1. Below average English,

2. Excessive number of citations to the authors own work in References,

3. Little interaction with EE and Computing,

4. Not within the conference scope or has not followed Template,

5. Author did not offer valid reasons for not attending, or did not upload to EDAS the presentation file (for committee review), or both.

 

**      **      **

 

 

IPC

Kai Juslin (SIMS)

Esko Juuso (SIMS)

Khalid Al-Begain (UKSim)

Rashid Mehmood (UKSim)

Gaius Mulley (UKSim)

Miroslav Snorek (CSSS)

Andras Javor (HSS)

Franco Maceri (ISCS)

Peter Schwartz (ASIM)

Charles Patchett (BAE, Warton)

Henri Pierreval (FRANCOSIM)

Yuri Merkuryev (LSS)

Zulkarnay Zakaria

(Malaysia)

Gaby Neumann (ASIM)

Hosam Faiq (Malaysia)

Hissam Tawfik (UK)

Jiri Kunovsky (CSSS)

Azian Azamimi Abdullah (Malaysia)

Sanjay Chaudhary (India)

Arijit Bhattacharya (Ireland)

Atulya Nagar (UK)

Gregorio Romero (Spain)

Kenneth Nwizege (UK)

Kathy Garden (NZ)

M Luisa Martinez (Spain)

Suiping Zhou (Singapore)

Mikulas Alexik (CSSS,EUROSIM President)

Borut Zupancic (SLOSIM)

Igor Skrjanc (SLOSIM)

Wan Hussain Wan Ishak (Malaysia)

Nitin Nitin (India)

Ford Gaol (Indonesia)

Philip Sallis (NZ)

Martin Tunnicliffe (UK)

David Murray-Smith (UKSim)

Mahdi Mahfouf (UKSim)

Kenneth Nwizege (UKSim)

Emelio Jimenez Macias (SPAIN)

Alessandra Orsoni (UKSim)

Vlatko Ceric (CROSSIM)Theodoros Kostis (Greece)

Russell Cheng (UKSim)

Miguel Angel Piera (Spain)

Antonio Guasch (Spain)

David Al-Dabass (UKSim)

Jadranka Bozikov (CROSSIM)

Richard Cant (UKSim)

Felix Breitenecker (ASIM, SNE)

Eduard Babulak (Canada)

Siegfried Wassertheurer (ASIM)Wolfgang Wiechert (ASIM)S. Wassertheurer (ASIM)

Janos Sebestyen-Janosy (HSS)

Olaf Ruhle (ASIM)

Zuwairie Ibrahim (Malaysia)

Marius Radulescu (ROMSIM)

Leon Bobrowski (PSCS)

Mojca Indihar Stemberger (Slovenia)

Rosni Abdulla (Malaysia)

Vesna Bosilj-Vuksic (Croatia)

Roland Wertz (Germany)
Fabian Bottinger (Germany)

Norlaili Safri (Malaysia)
Helen Karatza(Greece)

Nikolaos V. Karadimas (Greece)

Piers Campbell (UAE)
Marco Remondino (Italy)

K.G. Subramanian (Malaysia)

Registration (all figures in US$) Currency Converter: Due to the labour intensive process of handling bank transfers a $50 surcharge applies.

Author/Participant

Student Paper

(2 authors maximum)

Student Participant

(no paper)

Credit Card

Bank Transfer

Credit Card

Bank Transfer

Credit Card

Bank Transfer

Registration BEFORE deadline of  10 November

IEEE Members: 5% discount is given to author after presentation at conference

$595

$30

$645

$30

$545

$25

$595

$25

$300

$350

Registration AFTER deadline of  10 November

IEEE Members: 5% discount given to author after presentation at conference

$640

$32

$690

$32

$590

$30

$640

$30

$350

$400

 

Registration: Only one method of payment is available on EDAS:

Credit Card: payment is accepted online and confirmation is instant.

 

Here is the procedure:

 

1. go to EDAS at http://edas.info and click on Register yellow tab at the top, a list of conferences will appear

2. Scroll down to conference name (e.g. AIMS2015) line and click on the extreme right green money symbol at the end of this line, a new page will appear

3. click on the extreme right button (Trolley symbol) after USD $595, a new table will immediately appear under a new line ‘Registered, but no paid’.

4. Under this table a list of credit card symbols and SWIFT. Click on the credit card symbol.  

 

5. A new page will appear, enter all card details, scroll down to the bottom and click Pay for Registration

 

6. REMEMBER: NO payment received by the set deadline means your paper will NOT be in the Proceedings.

 

If you have problems meeting this deadline email david.al-dabass@ntu.ac.uk immediately.

 

Best wishes and look forward to meeting you at the conference.

Conference Chairs.

AIMS2015 Program at a glance, 10am KK time, 3 December 2015.

 

Session chairs and co-chairs are still urgently needed.

Kindly look through the program below and choose a session where

you are not presenter and email david.al-dabass@ntu.ac.uk immediately.

Certificates of merit will be awarded to mark your contribution to the success of the conference.

 

AIMS2015 Conference Program at a Glance:

Session CodeWed.pm1 means Wednesday afternoon before tea break.

Other Time periods: am1, am2, pm1, pm2

Paper Code: e.g. K1 see following pages for a full list:

Track letter: A, B, C . and paper number within track e.g. K1

Day-0: Tuesday 1 December 2015: 5 to 6pm, Early registration desk opens for one hour, Le Meridien Hotel.

Time

Day-1: Wednesday 2 December 2015  (Keynote Speaker-1 + 47 papers)

8.15 - 9.30

Wed.am1.A: (Chair: David Al-Dabass/Ismail Saad): Opening session and keynote Speaker-1: Prof Yong Men TEO

9.30 - 9.45

Refreshments

 

Room A

Room B

9.45 - 12.05, 7

Wed.am2.A (Chair Zuwairie Ibrahim-C4/ Mabuza-Hocquet-S6):

A1, F3, A3, A4, [], H2, H3

Wed.am2.B (Chair: Pad Nayak-X7/ Wan Isa-T1):

B1, B3, B4, B5, B6, K2, K3

12.05 - 1.05

Lunch

1.05 - 3.45, 9

Wed.pm1.A (Chair: Bagus Arthaya-T2/ Vitaliy Mezhuyev-V1):

P1+I1, P2, P3, P4, P5, P6, P7, XX1

Wed.pm1.B (Chair: Oleksandr Letychevskyi-Q1/ Mohd Furqan-F2+S7):

C1, C2, C3, C4, C5, J1, N1, N2-ns, O1

3.45 - 3.55

Refreshments

3.55 - 6.35, 8

Wed.pm2.A (Chair: Srinivasa Chalamala-K3/ Baldev Singh-J1):

Q1, Q2, Q3, Q5, Q6, F2, A2, F4

Wed.pm2.B (Chair: Dasari Pushpalatha-B6/ Nilam Choudhary-J1):

X1, X2, X4, X5, X6, X7, L1, V1

6.35 - 6.45

Close of day-1 and photo opportunity

7.30 - 9.30

Conference Dinner

Day-2: Thursday 3 December 2015  (Keynote Speaker-2 + 18 papers)

8.15 - 9.25

Thu.am1.A: (Chair: David Al-Dabass/Ismail Saad): day-2 opening session and Keynote speaker-2 Prof Vitaliy Mezhuyev

9.30 - 10.30, 3

Thu.am2.A (Chair: Mohd Furqan-F2+S7/ Sachin Gavankar-H3):

S1, S2, S4

Thu.am2.B (Chair: Oleksandr Letychevskyi-Q1/ Nilam Choudhary-J1):

T1, T2, T3

10.30 - 10.45

Refreshments

10.45 - 12.45, 6

Thu.am3.A (Chair: Wan Isa-T1/ Viswa Cheda-X6):

S5, S6, S7, S8, S9, S10

Thu.am3.B (Chair: Dasari Pushpalatha-B6/ Ali Chekima):

U1, U2, XX2, Y2, Z1, Q7

12.45 - 12.50

Close of Conference and photo opportunity

12.50pm - 2pm

Lunch

2pm -

Social Program and Free Time to explore the heritage, culture and history of Kota Kinabalu and Malaysia

Day-3 Friday 4 December 2015: Social Program and Free Time to explore the heritage, culture and history of Kota Kinabalu and Malaysia

Day-1 requested: X2. A2 and F3 swapped. Q7, I1, C5 late request

Session chairs on standby: Nurmin Bolong, Muralindran Mariappan, Khairul Anuar Mohamad, Ali Farzamnia, Mohd Hanafi Ahmad Hijazi, Chin Kim On, Abdula K P, Zuwairie Ibrahim,

 

Papers by Track with Presenter

 

Seq

#

Track: 01.A. Artificial Intelligence

First author

Presenters: names

A1

1570219466

A Machine Learning-Based Approach to Estimate the CPU-Burst Time for Processes in the Computational Grids

Tarek Helmy

Bin-Obaidellah

A2

1570222472

A Nature Inspired Heuristic Optimization Algorithm Based on Lightning

Hussain Shareef

Shareef

A3

1570231718

Optimizing Cluster of Questions by Using Dynamic Mutation in Genetic Algorithm

Nur Suhailayani Suhaimi

Suhaimi

A4

1570231966

Local Binary Patterns for Gender Classification

Balakrishna Gudla

Gudla

 

 

Track: 02.B. Neural Networks & Fuzzy Systems

 

 

B1

1570227288

Multi-layer Fuzzy Logic for Welfare Disbursement

Noor Hidayah Zakaria

Zakaria

B2

1570227295

Power Energy Management for a Grid-Connected PV System Using Rule-Base Fuzzy Logic

Nousheen Hashmi

 

B3

1570231761

Minutiae Matching Algorithm Using Artificial Neural Network for Fingerprint Recognition

Hariyanto Rawad Murdiyono

Sudiro

B4

1570231968

Design and Evaluation of a Multi-model, Multi-level Artificial Neural Network for Eczema Skin Lesion Detection

Simon Philippe Zapido

Zapido

B5

1570232008

A CMOS Analog Current-Mode Direct and Complementary Membership Function Circuit for Fuzzy Logic Controller Applications

Abdulla Kunnath Parambil

Kunnath Parambil

B6

1570232846

A Clustering Algorithm for WSN to Optimize the Network Lifetime Using Type-2 Fuzzy Logic Model

Dasari Pushpalatha

Pushpalatha

 

 

Track: 03.C.Evolutionary Computation

 

 

C1

1570226572

Improved Particle Swarm Optimization Based on Velocity Clamping and Particle Penalization

Musaed A. Alhussein

Haider

C2

1570226582

A Novel Multi-Objective Optimization Model for Minute-in-Trail Strategy Based on Sector Workload Restriction

Fanrong Sun

 Sun

C3

1570227837

An Idiotypic Solution Sieve for Selecting the Best Performing Solutions in Real-World Distributed Intelligence

Shashi Shekhar Jha

 Jha

C4

1570231243

BSKF: Binary Simulated Kalman Filter

Zulkifli Md Yusof

Ibrahim

C5

1570231564

A New Variant of Arithmetic Mean Iterative Method for Fourth Order Integro-differential Equations Solution

Elayaraja Aruchunan

 Aruchunan, late request

 

 

Track: 06.F.Bioinformatics and Bioengineering

 

 

F1

1570225222

A Generic Framework for Biomedical Snippet Retrieval

Yan Li

 

F2

1570231130

Protein Map of Control Mice Exposed to Context Fear Using A Novel Implementation of Granger Causality

Mohammad Shaheryar Furqan

Furqan

F3

1570231987

Pattern Matching Performance Comparison as Big Data Analysis Recommendations for Hepatitis C Virus (HCV) Sequence DNA

Berlian Al Kindhi

Al Kindhi

F4

1570232001

Electromyogram (EMG) Signal Processing Analysis for Clinical Rehabilitation Application

Bun Seng Chan

Bais

 

 

Track: 08.H.Data and Semantic Mining

 

 

H1

1570222940

Dimensionality Reduction with a Composite-Selective Strategy in Documents with a Hybrid Content

Saeed Raheel

 

H2

1570225411

Comparative Analysis Between K-Means and K-Medoids for Statistical Clustering

Norazam Arbin

Arbin

H3

1570231689

Decision Tree: Review of Techniques for Missing Values At Training, Testing and Compatibility

Sachin Gavankar

Gavankar

 

 

Track: 09.I.Games, VR and Visualization

 

 

I1

1570231799

A Virtual Reality Testbed for Camera Simulation in Aerospace Applications

Thomas Steil

 Emde, late request

 

 

Track: 10.J.Emergent Technologies

 

 

J1

1570227357

Scope of Cloud Computing in Indian Technical Education

Nilam Choudhary

Choudhary; Singh

 

 

Track: 11.K. Intelligent Systems and Applicaitons

 

 

K1

1570225619

Developing a Software Application for Identifying Potential Terrorists At Airports: Application of Predictive Profiling Using Fuzzy Logic

Reggie Davidrajuh

 

K2

1570227265

Classification of Product Images in Different Color Models with Customized Kernel for Support Vector Machine

Stanley Oyewole

Oyewole

K3

1570231974

Local Binary Patterns for Digital Image Watermarking

Srinivasa Rao Chalamala

 Chalamala

 

 

Track: 12.L.Hybrid and Soft Computing

 

 

L1

1570231957

Implementation of Greedy and Simulated Annealing Algorithms for Wireless Access Point Placement

Nila Puspitasari

Wibowo

 

 

Track: 14.N.Control of Intelligent Systems and Control Intelligence

 

 

N1

1570225999

Sensitivity Measures and Modeling Errors for YOULA Parameterization Based Regulators

Csilla Banyasz

Keviczky

N2

1570227703

Design of an Integrated Fish Auction System in Indonesia Using RFID

Suryadiputra Liawatimena

Liawatimena

 

 

Track: 15.O.e-Science and e-Systems

 

 

O1

1570227868

Developing a Web-based Simulation-based Learning System for Enhancing Concepts of Linked-list Structures in Data Structures Curriculum

Ah-Fur Lai

Lai

 

 

Track: 16.P.Robotics, Cybernetics, Engineering, Manufacturing and Control

 

 

P1

1570224888

Modelling and Simulation of a Laser Scanner with Adjustable Pattern as Virtual Prototype for Future Space Missions

Markus Emde

Emde

P2

1570226998

An Improved Anti-windup Control Using a PI Controller

Kyohei Sakai

 Sakai

P3

1570227000

Model Matching Control Based on Discrete-Time Improved ADRC Considering Plant Input-side Disturbance

Ryo Tanaka

Tanaka

P4

1570227007

Approach to New Model Recovery Anti-Windup Scheme with PID Controller

Kazushi Kawamura

Kawamura

P5

1570227458

Controller Design by Frequency-Domain Fictitious Reference Iterative Tuning Using Sliding DFT

Nobutoshi Suwa

 Suwa

P6

1570227575

Multiple Outputs Programmable Integrated Circuits (MOPICs) Microcontroller Trainer for Educational Applications

Ibrahim Burhan

Burhan

P7

1570231751

An Experimental Investigation Into Curvature Uncertainties in Executing Piecewise Continuous Dubins Curves in Path Planning

Madhavan Shanmugavel

Shanmugavel

P8

1570232144

Quantized H1 Static Output Control for Linear Systems with Interval-Bounded Additive Controller Coefficient Variations

Jianliang Wang

 

 

Track: 17.Q.Methodologies, Tools and Operations Research

 

 

Q1

1570226033

Symbolic Modelling in White-Box Model-Based Testing

Volodymyr Peschanenko

Letychevskyi

Q2

1570227645

Defect Management Life Cycle Process for Software Quality Improvement

Aedah Abd Rahman

Abd Rahman

Q3

1570227649

Defining Methodology for Multi Model Software Process Improvement Framework

Aedah Abd Rahman

Abd Rahman

Q4

1570228036

Designing Acceptance Test Procedures (ATPs) for Smart Nano Grid Applications

Kiran Choudhry

 

Q5

1570231722

Optimal Supply Chain Design: A Case Study in Toothbrush Industry

Tai Pham

Pham

Q6

1570231724

A Computational Study of Risk-Averse Parameter Effects on a 2-Stage Supply Chain Coordination Under Refund-Dependent Demand

Loi Nguyen

Nguyen

Q7

1570231779

Integration of Fuzzy C-Means with Correlation Template and Active Contour for Brain Lesion Segmentation in Diffusion-Weighted MRI

Ayuni Fateeha Muda

Muda, late request

 

 

Track 5: 18.R.Discrete Event and Real Time Systems

 

 

R1

1570228054

Modeling Humanoid Robot as a Discrete Event System: A Modular Approach Based on Petri Nets

Reggie Davidrajuh

 

 

 

Track: 19.S.Image, Speech and Signal Processing

 

 

S1

1570225016

Semantic Environment Perception, Localization and Mapping

Bjoern Sondermann

Emde

S2

1570227259

Statistical Speaker Diarization Using Dependent Combination of Extracted Features

Hasan Kadhim

Kadhim

S3

1570227625

Real Time Detection and Tracking of Mouth Region of Single Human Face

Anitha C

 

S4

1570228367

Incremental Learning and Novelty Detection of Gestures in a Multi-Class System

Husam Al-Behadili

Al-Behadili

S5

1570231416

Intetnet of Things: Securing Data Using Image Steganography

Vahab Iranmanesh

Iranmanesh

S6

1570231496

Fusion of Phase Congruency and Harris Algorithm for Extraction of Iris Corner Points

Gugulethu Mabuza-Hocquet

Mabuza-Hocquet

S7

1570231881

Gene Network Inference Using Forward Backward Pairwise Granger Causality

Mohammad Shaheryar Furqan

Furqan

S8

1570231932

Tamper Detection in Speech Based Access Control Systems Using Watermarking

Bala Mallikarjunarao Garlapati

Garlapati

S9

1570231945

Semi-Supervised Learning Using Incremental Polynomial Classifier and Extreme Value Theory

Husam Al-Behadili

Al-Behadili

S10

1570231984

An audio/speech Watermarking Method for Copyright Protection

Krishna Rao Kakkirala

Kakkirala

S11

1570232567

Securing Biometric Authentication Through Multimodal Watermarking

Wadood Abdul

 

 

 

Track: 19.Sa Natural Language Processing/Language Technologies

 

 

Sa1

1570232073

On the Trade-Off Between Multi-Level Security Classification Accuracy and Training Time

Paal Engelstad

 

 

 

Track: 20.T.Industry, Business, Management, Human Factors and Social Issues

 

 

T1

1570230891

Exploring the Adoption of Blended Learning: Case of Mobile Learning

Wan Abdul Rahim Wan Mohd Isa

Wan Mohd Isa

T2

1570231943

The Redesign of Grashof Incubator Concerning the Alternative Heating System and the Ergonomic Aspect

Bagus Arthaya

Arthaya

T3

1570232108

Analysis of Feature Parameters for Objective Stress Assessment of Indoor Noises

Kwang Myung Jeon

Jeon

 

 

Track: 21.U.Energy, Power, Transport, Logistics, Harbour, Shipping and Marine Simulation

 

 

U1

1570227191

Effects of Station Location and Capacity for Personal Mobility Sharing

Kohji Tomita

 Tomita

U2

1570227526

Modeling and Simulation Study for Dynamic Model for Brushless Doubly Fed Reluctance Machine Using Matlab Simulink

William Song

Song

 

 

Track: 22.V.Parallel, Distributed and Software Architectures and Systems

 

 

V1

1570223854

Ontology-driven Development of the Metamodels for Modelling Distributed Parallel Software Systems

Vitaliy Mezhuyev

Mezhuyev

 

 

Track: 24.X.Mobile/Ad hoc wireless networks, mobicast, sensor placement, target tracking

 

 

X1

1570223744

A New Coordinated Beamformer for MIMO-based Ad Hoc Networks

Makan Zamanipour

Zamanipour

X2

1570227754

An Improved Quality of Service Using R-AODV Protocol in MANETs

Siddlingappagouda Biradar

Biradar

X3

1570228294

Experimental Evaluation of a WiFi Device in an Undersea Environment

Yoshiaki Taniguchi

 

X4

1570231356

On the Optimizing of LTE System Performance for SISO and MIMO Modes

Ali Bin Salem

Bin Salem

X5

1570231602

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

Yoshiaki Morino

Morino

X6

1570231749

A Study on Vehicular Adhoc Networks

Duduku V Viswacheda

Viswacheda

X7

1570231896

Analysis of Random Way Point and Random Walk Mobility Model for Reactive Routing Protocols for MANET Using NetSim Simulator

Padmalaya Nayak

Nayak

 

 

Track: 25.Y.Performance Engineering of Computer & Communication Systems

 

 

Y1

1570219992

Improving Network Performance with Rate Adaptation Algorithms for Vehicular Simulations

Kenneth Nwizege

Y2

1570220427

Performance Enhancement by Adaptive Resource Allocation

Hayam Alyasiri

Alnakkash

 

 

Track: 26.Z.Circuits, Sensors and Devices

 

 

Z1

1570232379

Equivalent Circuit Model Analysis of Vertical Impact Ionization MOSFET (IMOS)

Andee Bacho

Bacho

Z2

1570232433

The Design of the Fire Detection of Microwave Antenna

Yong-Lin Yu

 

XX1

1570222300

ReduxGO: Context-aware Mobile Recommender Application for Reducing Stop-and-Go Scenario Late paper, presented in KK, publish in ISMS2016.

Nazleeni Haron

Nazleeni Haron

XX2

1570227970

Performance Analysis of Half-Sweep Successive Over-Relaxation Iterative Method for Solving Four-Point Composite Closed Newton-Cotes System Late paper, presented in KK, publish in ISMS2016.

Mohana Muthuvalu

Mohana Muthuvalu

 

********** **********

 

Papers to be Published

 

If you have paid the fee within the past 24 hours or intend to pay soon (by credit card on EDAS is the only accepted method), do not wait till the final deadline as your paper may need several revisions email the general chair immediately on david.al-dabass@ntu.ac.uk.

 

Presentation missing

 

IEEE-Xplore: a paper will not be submitted to IEEE-Xplore if it suffers from one or more of the following problems:

1. Below average English,

2. Excessive number of citations to the authors own work in References,

3. Little interaction with EE and Computing,

4. Not within the conference scope or has not followed Template,

5. Author did not offer valid reasons for not attending, or did not upload to EDAS the presentation file (for committee review), or both.

 

 

Seq

#

Title

First author

Presentation uploaded

Presenters: names

1

1570219466

A Machine Learning-Based Approach to Estimate the CPU-Burst Time for Processes in the Computational Grids

Tarek Helmy

11/28/15

Bin-Obaidellah

2

1570219992

Improving Network Performance with Rate Adaptation Algorithms for Vehicular Simulations

Kenneth Nwizege

11/28/15

 

3

1570220427

Performance Enhancement by Adaptive Resource Allocation

Hayam Alyasiri

11/19/15

Alnakkash

4

1570222472

A Nature Inspired Heuristic Optimization Algorithm Based on Lightning

Hussain Shareef

11/27/15

Shareef

5

1570222940

Dimensionality Reduction with a Composite-Selective Strategy in Documents with a Hybrid Content

Saeed Raheel

11/28/15

 

6

1570223744

A New Coordinated Beamformer for MIMO-based Ad Hoc Networks

Makan Zamanipour

11/24/15

Zamanipour

7

1570223854

Ontology-driven Development of the Metamodels for Modelling Distributed Parallel Software Systems

Vitaliy Mezhuyev

11/26/15

Mezhuyev

8

1570224888

Modelling and Simulation of a Laser Scanner with Adjustable Pattern as Virtual Prototype for Future Space Missions

Markus Emde

 

Emde

9

1570225016

Semantic Environment Perception, Localization and Mapping

Bjoern Sondermann

11/24/15

Emde

10

1570225222

A Generic Framework for Biomedical Snippet Retrieval

Yan Li

11/13/15

 

11

1570225411

Comparative Analysis Between K-Means and K-Medoids for Statistical Clustering

Norazam Arbin

 

Arbin

12

1570225619

Developing a Software Application for Identifying Potential Terrorists At Airports: Application of Predictive Profiling Using Fuzzy Logic

Reggie Davidrajuh

11/16/15

 

13

1570225999

Sensitivity Measures and Modeling Errors for YOULA Parameterization Based Regulators

Csilla Banyasz

 

Keviczky

14

1570226033

Symbolic Modelling in White-Box Model-Based Testing

Volodymyr Peschanenko

 

Letychevskyi

15

1570226572

Improved Particle Swarm Optimization Based on Velocity Clamping and Particle Penalization

Musaed A. Alhussein

11/27/15

Haider

16

1570226582

A Novel Multi-Objective Optimization Model for Minute-in-Trail Strategy Based on Sector Workload Restriction

Fanrong Sun

11/28/15

Sun

17

1570226998

An Improved Anti-windup Control Using a PI Controller

Kyohei Sakai

11/27/15

Sakai

18

1570227000

Model Matching Control Based on Discrete-Time Improved ADRC Considering Plant Input-side Disturbance

Ryo Tanaka

11/24/15

Tanaka

19

1570227007

Approach to New Model Recovery Anti-Windup Scheme with PID Controller

Kazushi Kawamura

11/27/15

Kawamura

20

1570227191

Effects of Station Location and Capacity for Personal Mobility Sharing

Kohji Tomita

11/26/15

Tomita

21

1570227259

Statistical Speaker Diarization Using Dependent Combination of Extracted Features

Hasan Kadhim

11/24/15

Kadhim

22

1570227265

Classification of Product Images in Different Color Models with Customized Kernel for Support Vector Machine

Stanley Oyewole

11/29/15

Oyewole

23

1570227288

Multi-layer Fuzzy Logic for Welfare Disbursement

Noor Hidayah Zakaria

11/25/15

Zakaria

24

1570227295

Power Energy Management for a Grid-Connected PV System Using Rule-Base Fuzzy Logic

Nousheen Hashmi

11/24/15

 

25

1570227357

Scope of Cloud Computing in Indian Technical Education

Nilam Choudhary

11/25/15

Choudhary; Singh

26

1570227458

Controller Design by Frequency-Domain Fictitious Reference Iterative Tuning Using Sliding DFT

Nobutoshi Suwa

11/27/15

Suwa

27

1570227526

Modeling and Simulation Study for Dynamic Model for Brushless Doubly Fed Reluctance Machine Using Matlab Simulink

William Song

11/28/15

Song

28

1570227575

Multiple Outputs Programmable Integrated Circuits (MOPICs) Microcontroller Trainer for Educational Applications

Ibrahim Burhan

11/27/15

Burhan

29

1570227625

Real Time Detection and Tracking of Mouth Region of Single Human Face

Anitha C

11/13/15

 

30

1570227645

Defect Management Life Cycle Process for Software Quality Improvement

Aedah Abd Rahman

11/19/15

Abd Rahman

31

1570227649

Defining Methodology for Multi Model Software Process Improvement Framework

Aedah Abd Rahman

11/19/15

Abd Rahman

32

1570227703

Design of an Integrated Fish Auction System in Indonesia Using RFID

Suryadiputra Liawatimena

11/15/15

Liawatimena

33

1570227754

An Improved Quality of Service Using R-AODV Protocol in MANETs

Siddlingappagouda Biradar

11/26/15

Biradar

34

1570227837

An Idiotypic Solution Sieve for Selecting the Best Performing Solutions in Real-World Distributed Intelligence

Shashi Shekhar Jha

11/22/15

Jha

35

1570227868

Developing a Web-based Simulation-based Learning System for Enhancing Concepts of Linked-list Structures in Data Structures Curriculum

Ah-Fur Lai

 

Lai

36

1570228036

Designing Acceptance Test Procedures (ATPs) for Smart Nano Grid Applications

Kiran Choudhry

11/15/15

 

37

1570228054

Modeling Humanoid Robot as a Discrete Event System: A Modular Approach Based on Petri Nets

Reggie Davidrajuh

11/16/15

 

38

1570228294

Experimental Evaluation of a WiFi Device in an Undersea Environment

Yoshiaki Taniguchi

11/14/15

 

39

1570228367

Incremental Learning and Novelty Detection of Gestures in a Multi-Class System

Husam Al-Behadili

11/27/15

Al-Behadili

40

1570230891

Exploring the Adoption of Blended Learning: Case of Mobile Learning

Wan Abdul Rahim Wan Mohd Isa

11/19/15

Wan Mohd Isa

41

1570231130

Protein Map of Control Mice Exposed to Context Fear Using A Novel Implementation of Granger Causality

Mohammad Shaheryar Furqan

11/25/15

Furqan

42

1570231243

BSKF: Binary Simulated Kalman Filter

Zulkifli Md Yusof

 

Ibrahim

43

1570231356

On the Optimizing of LTE System Performance for SISO and MIMO Modes

Ali Bin Salem

11/20/15

Bin Salem

44

1570231416

Intetnet of Things: Securing Data Using Image Steganography

Vahab Iranmanesh

11/24/15

Iranmanesh

45

1570231496

Fusion of Phase Congruency and Harris Algorithm for Extraction of Iris Corner Points

Gugulethu Mabuza-Hocquet

11/27/15

Mabuza-Hocquet

46

1570231564

A New Variant of Arithmetic Mean Iterative Method for Fourth Order Integro-differential Equations Solution

Elayaraja Aruchunan

 

Aruchunan

47

1570231602

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

Yoshiaki Morino

11/29/15

Morino

48

1570231689

Decision Tree: Review of Techniques for Missing Values At Training, Testing and Compatibility

Sachin Gavankar

11/28/15

Gavankar

49

1570231718

Optimizing Cluster of Questions by Using Dynamic Mutation in Genetic Algorithm

Nur Suhailayani Suhaimi

 

Suhaimi

50

1570231722

Optimal Supply Chain Design: A Case Study in Toothbrush Industry

Tai Pham

11/16/15

Pham

51

1570231724

A Computational Study of Risk-Averse Parameter Effects on a 2-Stage Supply Chain Coordination Under Refund-Dependent Demand

Loi Nguyen

11/19/15

Nguyen

52

1570231749

A Study on Vehicular Adhoc Networks

Duduku V Viswacheda

11/24/15

Viswacheda

53

1570231751

An Experimental Investigation Into Curvature Uncertainties in Executing Piecewise Continuous Dubins Curves in Path Planning

Madhavan Shanmugavel

11/27/15

Shanmugavel

54

1570231761

Minutiae Matching Algorithm Using Artificial Neural Network for Fingerprint Recognition

Hariyanto Rawad Murdiyono

11/27/15

Sudiro

55

1570231779

Integration of Fuzzy C-Means with Correlation Template and Active Contour for Brain Lesion Segmentation in Diffusion-Weighted MRI

Ayuni Fateeha Muda

11/28/15

Muda

56

1570231799

A Virtual Reality Testbed for Camera Simulation in Aerospace Applications

Thomas Steil

 

Emde

57

1570231881

Gene Network Inference Using Forward Backward Pairwise Granger Causality

Mohammad Shaheryar Furqan

11/27/15

Furqan

58

1570231896

Analysis of Random Way Point and Random Walk Mobility Model for Reactive Routing Protocols for MANET Using NetSim Simulator

Padmalaya Nayak

11/27/15

Nayak

59

1570231932

Tamper Detection in Speech Based Access Control Systems Using Watermarking

Bala Mallikarjunarao Garlapati

11/20/15

Garlapati

60

1570231943

The Redesign of Grashof Incubator Concerning the Alternative Heating System and the Ergonomic Aspect

Bagus Arthaya

11/22/15

Arthaya

61

1570231945

Semi-Supervised Learning Using Incremental Polynomial Classifier and Extreme Value Theory

Husam Al-Behadili

11/27/15

Al-Behadili

62

1570231957

Implementation of Greedy and Simulated Annealing Algorithms for Wireless Access Point Placement

Nila Puspitasari

11/27/15

Wibowo

63

1570231966

Local Binary Patterns for Gender Classification

Balakrishna Gudla

11/20/15

Gudla

64

1570231968

Design and Evaluation of a Multi-model, Multi-level Artificial Neural Network for Eczema Skin Lesion Detection

Simon Philippe Zapido

11/28/15

Zapido

65

1570231974

Local Binary Patterns for Digital Image Watermarking

Srinivasa Rao Chalamala

11/20/15

Chalamala

66

1570231984

An audio/speech Watermarking Method for Copyright Protection

Krishna Rao Kakkirala

11/20/15

Kakkirala

67

1570231987

Pattern Matching Performance Comparison as Big Data Analysis Recommendations for Hepatitis C Virus (HCV) Sequence DNA

Berlian Al Kindhi

11/27/15

Al Kindhi

68

1570232001

Electromyogram (EMG) Signal Processing Analysis for Clinical Rehabilitation Application

Bun Seng Chan

11/29/15

Bais

69

1570232008

A CMOS Analog Current-Mode Direct and Complementary Membership Function Circuit for Fuzzy Logic Controller Applications

Abdulla Kunnath Parambil

11/24/15

Kunnath Parambil

70

1570232073

On the Trade-Off Between Multi-Level Security Classification Accuracy and Training Time

Paal Engelstad

11/26/15

 

71

1570232108

Analysis of Feature Parameters for Objective Stress Assessment of Indoor Noises

Kwang Myung Jeon

11/25/15

Jeon

72

1570232144

Quantized H1 Static Output Control for Linear Systems with Interval-Bounded Additive Controller Coefficient Variations

Jianliang Wang

11/25/15

 

73

1570232379

Equivalent Circuit Model Analysis of Vertical Impact Ionization MOSFET (IMOS)

Andee Bacho

11/28/15

Bacho

74

1570232433

The Design of the Fire Detection of Microwave Antenna

Yong-Lin Yu

11/12/15

 

75

1570232567

Securing Biometric Authentication Through Multimodal Watermarking

Wadood Abdul

11/13/15

 

76

1570232846

A Clustering Algorithm for WSN to Optimize the Network Lifetime Using Type-2 Fuzzy Logic Model

Dasari Pushpalatha

11/28/15

Pushpalatha

 

.-.-.

 

Selection of Best Papers and for IJSSST

 

 

Blue = Best papers. Blue and Green 19 papers selected for IJSSST

 

Grey = Not presented papers, excluded from selection.

 

 

If your paper has been selected congratulations, here are the steps:

1.    Extend the paper by at least one page over the conference paper, up to a maximum of 20 pages

2.    Amend the title, abstract section and conclusions to reflect the additional material

3.    Submit the new version to IJSSST-V17 Issue No. 4 using EDAS, by the end of February 2016.

4.    Inform the general chair on david.al-dabass@ntu.ac.uk and Guest Editor on ismail_s@ums.edu.my

 

Best papers are published without fee, Green papers are published at flat rate of $75, up to 20 pages. If your paper has not been selected but you still wish to submit an extended version to IJSSST there will be the normal publication charge of $15 per page with a minimum of 10 pages.

 

Seq

#

Title

Status

First author

Presenters: names

review: avg

37

1570228054

Modeling Humanoid Robot as a Discrete Event System: A Modular Approach Based on Petri Nets

Published

Reggie Davidrajuh

 

0.8

56

1570231799

A Virtual Reality Testbed for Camera Simulation in Aerospace Applications

Published

Thomas Steil

Emde

0.8

61

1570231945

Semi-Supervised Learning Using Incremental Polynomial Classifier and Extreme Value Theory

Published

Husam Al-Behadili

Al-Behadili

0.8

1

1570219466

A Machine Learning-Based Approach to Estimate the CPU-Burst Time for Processes in the Computational Grids

Published

Tarek Helmy

Bin-Obaidellah

0.7

2

1570219992

Improving Network Performance with Rate Adaptation Algorithms for Vehicular Simulations

Published

Kenneth Nwizege

 

0.7

3

1570220427

Performance Enhancement by Adaptive Resource Allocation

Published

Hayam Alyasiri

Alnakkash

0.7

4

1570222472

A Nature Inspired Heuristic Optimization Algorithm Based on Lightning

Published

Hussain Shareef

Shareef

0.7

5

1570222940

Dimensionality Reduction with a Composite-Selective Strategy in Documents with a Hybrid Content

Published

Saeed Raheel

 

0.7

8

1570224888

Modelling and Simulation of a Laser Scanner with Adjustable Pattern as Virtual Prototype for Future Space Missions

Published

Markus Emde

Emde

0.7

9

1570225016

Semantic Environment Perception, Localization and Mapping

Published

Bjoern Sondermann

Emde

0.7

10

1570225222

A Generic Framework for Biomedical Snippet Retrieval

Published

Yan Li

 

0.7

11

1570225411

Comparative Analysis Between K-Means and K-Medoids for Statistical Clustering

Published

Norazam Arbin

Arbin

0.7

17

1570226998

An Improved Anti-windup Control Using a PI Controller

Published

Kyohei Sakai

Sakai

0.7

18

1570227000

Model Matching Control Based on Discrete-Time Improved ADRC Considering Plant Input-side Disturbance

Published

Ryo Tanaka

Tanaka

0.7

19

1570227007

Approach to New Model Recovery Anti-Windup Scheme with PID Controller

Published

Kazushi Kawamura

Kawamura

0.7

21

1570227259

Statistical Speaker Diarization Using Dependent Combination of Extracted Features

Published

Hasan Kadhim

Kadhim

0.7

26

1570227458

Controller Design by Frequency-Domain Fictitious Reference Iterative Tuning Using Sliding DFT

Published

Nobutoshi Suwa

Suwa

0.7

39

1570228367

Incremental Learning and Novelty Detection of Gestures in a Multi-Class System

Published

Husam Al-Behadili

Al-Behadili

0.7

54

1570231761

Minutiae Matching Algorithm Using Artificial Neural Network for Fingerprint Recognition

Published

Hariyanto Rawad Murdiyono

Sudiro

0.7

55

1570231779

Integration of Fuzzy C-Means with Correlation Template and Active Contour for Brain Lesion Segmentation in Diffusion-Weighted MRI

Published

Ayuni Fateeha Muda

Muda

0.7

62

1570231957

Implementation of Greedy and Simulated Annealing Algorithms for Wireless Access Point Placement

Published

Nila Puspitasari

Wibowo

0.7

64

1570231968

Design and Evaluation of a Multi-model, Multi-level Artificial Neural Network for Eczema Skin Lesion Detection

Published

Simon Philippe Zapido

Zapido

0.7

73

1570232379

Equivalent Circuit Model Analysis of Vertical Impact Ionization MOSFET (IMOS)

Published

Andee Bacho

Bacho

0.7

75

1570232567

Securing Biometric Authentication Through Multimodal Watermarking

Published

Wadood Abdul

 

0.7

6

1570223744

A New Coordinated Beamformer for MIMO-based Ad Hoc Networks

Published

Makan Zamanipour

Zamanipour

0.6

7

1570223854

Ontology-driven Development of the Metamodels for Modelling Distributed Parallel Software Systems

Published

Vitaliy Mezhuyev

Mezhuyev

0.6

13

1570225999

Sensitivity Measures and Modeling Errors for YOULA Parameterization Based Regulators

Published

Csilla Banyasz

Keviczky

0.6

15

1570226572

Improved Particle Swarm Optimization Based on Velocity Clamping and Particle Penalization

Published

Musaed A. Alhussein

Haider

0.6

16

1570226582

A Novel Multi-Objective Optimization Model for Minute-in-Trail Strategy Based on Sector Workload Restriction

Published

Fanrong Sun

Sun

0.6

20

1570227191

Effects of Station Location and Capacity for Personal Mobility Sharing

Published

Kohji Tomita

Tomita

0.6

22

1570227265

Classification of Product Images in Different Color Models with Customized Kernel for Support Vector Machine

Published

Stanley Oyewole

Oyewole

0.6

23

1570227288

Multi-layer Fuzzy Logic for Welfare Disbursement

Published

Noor Hidayah Zakaria

Zakaria

0.6

24

1570227295

Power Energy Management for a Grid-Connected PV System Using Rule-Base Fuzzy Logic

Published

Nousheen Hashmi

 

0.6

27

1570227526

Modeling and Simulation Study for Dynamic Model for Brushless Doubly Fed Reluctance Machine Using Matlab Simulink

Published

William Song

Song

0.6

29

1570227625

Real Time Detection and Tracking of Mouth Region of Single Human Face

Published

Anitha C

 

0.6

31

1570227649

Defining Methodology for Multi Model Software Process Improvement Framework

Published

Aedah Abd Rahman

Abd Rahman

0.6

34

1570227837

An Idiotypic Solution Sieve for Selecting the Best Performing Solutions in Real-World Distributed Intelligence

Published

Shashi Shekhar Jha

Jha

0.6

42

1570231243

BSKF: Binary Simulated Kalman Filter

Published

Zulkifli Md Yusof

Ibrahim

0.6

50

1570231722

Optimal Supply Chain Design: A Case Study in Toothbrush Industry

Published

Tai Pham

Pham

0.6

51

1570231724

A Computational Study of Risk-Averse Parameter Effects on a 2-Stage Supply Chain Coordination Under Refund-Dependent Demand

Published

Loi Nguyen

Nguyen

0.6

57

1570231881

Gene Network Inference Using Forward Backward Pairwise Granger Causality

Published

Mohammad Shaheryar Furqan

Furqan

0.6

58

1570231896

Analysis of Random Way Point and Random Walk Mobility Model for Reactive Routing Protocols for MANET Using NetSim Simulator

Published

Padmalaya Nayak

Nayak

0.6

59

1570231932

Tamper Detection in Speech Based Access Control Systems Using Watermarking

Published

Bala Mallikarjunarao Garlapati

Garlapati

0.6

60

1570231943

The Redesign of Grashof Incubator Concerning the Alternative Heating System and the Ergonomic Aspect

Published

Bagus Arthaya

Arthaya

0.6

63

1570231966

Local Binary Patterns for Gender Classification

Published

Balakrishna Gudla

Gudla

0.6

66

1570231984

An audio/speech Watermarking Method for Copyright Protection

Published

Krishna Rao Kakkirala

Kakkirala

0.6

67

1570231987

Pattern Matching Performance Comparison as Big Data Analysis Recommendations for Hepatitis C Virus (HCV) Sequence DNA

Published

Berlian Al Kindhi

Al Kindhi

0.6

68

1570232001

Electromyogram (EMG) Signal Processing Analysis for Clinical Rehabilitation Application

Published

Bun Seng Chan

Bais

0.6

69

1570232008

A CMOS Analog Current-Mode Direct and Complementary Membership Function Circuit for Fuzzy Logic Controller Applications

Published

Abdulla Kunnath Parambil

Kunnath Parambil

0.6

70

1570232073

On the Trade-Off Between Multi-Level Security Classification Accuracy and Training Time

Published

Paal Engelstad

 

0.6

72

1570232144

Quantized H1 Static Output Control for Linear Systems with Interval-Bounded Additive Controller Coefficient Variations

Published

Jianliang Wang

 

0.6

74

1570232433

The Design of the Fire Detection of Microwave Antenna

Published

Yong-Lin Yu

 

0.6

76

1570232846

A Clustering Algorithm for WSN to Optimize the Network Lifetime Using Type-2 Fuzzy Logic Model

Published

Dasari Pushpalatha

Pushpalatha

0.6

12

1570225619

Developing a Software Application for Identifying Potential Terrorists At Airports: Application of Predictive Profiling Using Fuzzy Logic

Published

Reggie Davidrajuh

 

0.5

14

1570226033

Symbolic Modelling in White-Box Model-Based Testing

Published

Volodymyr Peschanenko

Letychevskyi

0.5

28

1570227575

Multiple Outputs Programmable Integrated Circuits (MOPICs) Microcontroller Trainer for Educational Applications

Published

Ibrahim Burhan

Burhan

0.5

30

1570227645

Defect Management Life Cycle Process for Software Quality Improvement

Published

Aedah Abd Rahman

Abd Rahman

0.5

33

1570227754

An Improved Quality of Service Using R-AODV Protocol in MANETs

Published

Siddlingappagouda Biradar

Biradar

0.5

35

1570227868

Developing a Web-based Simulation-based Learning System for Enhancing Concepts of Linked-list Structures in Data Structures Curriculum

Published

Ah-Fur Lai

Lai

0.5

36

1570228036

Designing Acceptance Test Procedures (ATPs) for Smart Nano Grid Applications

Published

Kiran Choudhry

 

0.5

38

1570228294

Experimental Evaluation of a WiFi Device in an Undersea Environment

Published

Yoshiaki Taniguchi

 

0.5

41

1570231130

Protein Map of Control Mice Exposed to Context Fear Using A Novel Implementation of Granger Causality

Published

Mohammad Shaheryar Furqan

Furqan

0.5

44

1570231416

Intetnet of Things: Securing Data Using Image Steganography

Published

Vahab Iranmanesh

Iranmanesh

0.5

45

1570231496

Fusion of Phase Congruency and Harris Algorithm for Extraction of Iris Corner Points

Published

Gugulethu Mabuza-Hocquet

Mabuza-Hocquet

0.5

46

1570231564

A New Variant of Arithmetic Mean Iterative Method for Fourth Order Integro-differential Equations Solution

Published

Elayaraja Aruchunan

Aruchunan

0.5

47

1570231602

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

Published

Yoshiaki Morino

Morino

0.5

48

1570231689

Decision Tree: Review of Techniques for Missing Values At Training, Testing and Compatibility

Published

Sachin Gavankar

Gavankar

0.5

49

1570231718

Optimizing Cluster of Questions by Using Dynamic Mutation in Genetic Algorithm

Published

Nur Suhailayani Suhaimi

Suhaimi

0.5

52

1570231749

A Study on Vehicular Adhoc Networks

Published

Duduku V Viswacheda

Viswacheda

0.5

53

1570231751

An Experimental Investigation Into Curvature Uncertainties in Executing Piecewise Continuous Dubins Curves in Path Planning

Published

Madhavan Shanmugavel

Shanmugavel

0.5

65

1570231974

Local Binary Patterns for Digital Image Watermarking

Published

Srinivasa Rao Chalamala

Chalamala

0.5

71

1570232108

Analysis of Feature Parameters for Objective Stress Assessment of Indoor Noises

Published

Kwang Myung Jeon

Jeon

0.5

25

1570227357

Scope of Cloud Computing in Indian Technical Education

Published

Nilam Choudhary

Choudhary; Singh

0.4

32

1570227703

Design of an Integrated Fish Auction System in Indonesia Using RFID

Published

Suryadiputra Liawatimena

Liawatimena

0.4

40

1570230891

Exploring the Adoption of Blended Learning: Case of Mobile Learning

Published

Wan Abdul Rahim Wan Mohd Isa

Wan Mohd Isa

0.4

43

1570231356

On the Optimizing of LTE System Performance for SISO and MIMO Modes

Published

Ali Bin Salem

Bin Salem

0.4

 

 

 

 

 

Keynote Speaker-1

Modelling and Simulation in

Experimental Cybersecurity Research

 

Yong Meng TEO

 

Department of Computer Science

National University of Singapore

Email: teoym@comp.nus.edu.sg

url: www.comp.nus.edu.sg/~teoym

 

Cybersecurity challenges today are very real and wide-ranging with significant implications across multiple domains and communities. For cybersecurity research to be impactful, an experimentation infrastructure with shared and validated models, tools and testbeds will enable researchers to design meaningful experiments and test environments. Among the pillars of science, modelling and simulation is a mean of scientific discovery that employs computing to simulate a physical system according to laws derived from theory and experiment. This keynote discusses a national shared infrastructure, currently being developed, to provide computing resources, repeatable and controllable experimental environments, among others, for the cybersecurity R&D community in Singapore.

 

This keynote, divided into three main parts, aims to share our experience in setting up a national infrastructure for modelling and simulation experimentation in cybersecurity. First, we review experimental cybersecurity infrastructures with different capabilities, namely, small stand-alone, localized, and large distributed. Next, we discuss the hardware infrastructure and software tools to support both user physical and/or virtual cybersecurity testbeds. The hardware is designed to support dynamic provisioning of computing nodes as bare metal or virtual machines, and network and storage allocation as dedicated physical hardware. To support the modelling and simulation experiment life cycle, software tools are required to model and construct experiments, emulate human and system activity and orchestrate network experiments among others. Cybersecurity experimentation must capture real world scale and human activity because it often involves analysis of large, complex, decentralized systems. To illustrate the use of the national infrastructure, we discuss the design of a simulation application for studying the effect of human behavior on cybersecurity and emergent behavior on new security vulnerabilities.

 

Biography

 

TEO Yong Meng is an Associate Professor of Computer Science at the National University of Singapore (NUS) and an Affiliate Professor at the NUS Business Analytics Centre. He was a Visiting Professor at various institutes in the Chinese Academy of Science, China from 2010-2014. He received his PhD in Computer Science from the University of Manchester. His research interest is on parallel and distributed systems and applications. In the last five years, he focused on the performance of parallel systems, cloud computing, and emergent properties in complex systems. The paper on strategy-proof dynamic pricing of cloud computing resources won the Best Paper Award at the 10th International Conference on Algorithms and Architectures for Parallel Processing in 2010. Another paper, co-authored with his PhD student, on time-based semantic validation won the ACM SIGSIM Best PhD Student Paper Award in 2009. He leads the Computer Systems Research Group. He also served as Advisor (Directors Office) on Large-Scale Computing Systems, Asia-Pacific Science and Technology Centre, Sun Microsystems Inc. from 2007-2008, and External Grant Evaluator, European Research Council (Ideas Specific Program) from 2008-2013. He has received numerous external research grants including European Commission, Fujitsu Computers (Singapore) Pte Ltd, Fujitsu Laboratories Ltd (Japan), Sun Microsystems/Oracle (USA), Nvidia, and PSA Corporation (Singapore) among other institutions.

 

 

Keynote Speaker-2

Metamodelling Approach for Modelling Domains with Different Mathematical Structure

 

Professor Vitaliy Mezhuyev

Head of the Software Engineering Research Group

Faculty of Computer Systems and Software Engineering

University Malaysia Pahang

Email: mejuev@ukr.net

 

The methodology of Domain Specific Mathematical Modelling (DSMM), whose implementation aims to overcome the shortcomings of existing methodology of Domain Specific Modelling is proposed. An additional level of the metamodelling architecture is introduced, which allows us to take into account a mathematical structure of modelled domains, and to use mathematical operations for the development of new effective methods for solving domain specific problems. The concepts of the metamodel, metamodelling, levels of the metamodelling architecture and the formal semantics of the DSMM metamodels are defined.  Examples of DSMM application for the development of metamodels and their use for the modelling domains in different mathematical semantics are discussed.

 

Biography:

 

Vitaliy Mezhuyev received the BS and MS degrees in physics and informatics from Berdyansk State Pedagogical University (BSPU), Ukraine, in 1997. In 2002, he received a Ph.D. in Physics and Teaching Physics from Kiev National Pedagogical University and, in 2012, the Sc.D. in Information Technologies from Odessa National Technical University, Ukraine. Starting in 2004, he has been Head of the Department of Informatics and Software Engineering at BSPU, Ukraine. Now he is visiting professor at the Faculty of Computer Systems and Software Engineering in University Malaysia Pahang. His current research interests include formal methods, model-driven software engineering, metamodeling, and the design of cyber-physical systems.

 

 

 

 

 

Counter 1