Information Technology - New Generations 15th International Conference on Information Technology

This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology – New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mini...

Full description

Bibliographic Details
Other Authors: Latifi, Shahram (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2018, 2018
Edition:1st ed. 2018
Series:Advances in Intelligent Systems and Computing
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Method of Processing Big Data
  • Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan
  • Modified Human Code for Bandwidth Optimization through Lossless Compression
  • Index
  • Speech Features Analysis for Tone Language Speaker Discrimination Systems
  • Selection of Transformations of Continuous Predictors in Logistic Regression
  • Part VI Software Engineering
  • A Generic Approach to Efficiently Parallelize Legacy Sequential Software
  • Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications
  • A Timed Petri NetModel to Specify Scenarios of Video Games
  • Survey of Biometric Techniques for Automotive Applications
  • A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations
  • Budget and User Feedback Control Strategy-based PRMS Scenario Web Application
  • A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules
  • An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games
  • A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies
  • Increasing the prediction quality of software defective modules with automatic feature engineering
  • Part VII High Performance Computing Architectures
  • NSF Noyce Recruitment and Mentorship
  • Mining Associations between Two Categories using Unstructured Text Data in Cloud
  • A Note on Computational Science Curriculum
  • Development of a Local Cloud-Based Bioinformatics Architecture
  • Part VIII Computer Vision, Image Processing/Analysis
  • AComputer Vision Based Algorithm for Obstacle Avoidance
  • The ST-Vis tool for SpatioTemporal Visualization
  • Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima
  • Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network
  • Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation
  • Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries
  • Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks
  • Denial of service attacks inwireless sensor networks with proposed countermeasures
  • Part III Education and Technology
  • Internet-Based Education: A New Milestone for Formal Language and Automata Courses
  • Teaching Communication Management in Software Projects through Serious Educational Games
  • Gamification applied in the teaching of agile Scrum methodology
  • An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework
  • Part IV Agile Software Testing and Development
  • Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects
  • Alignment of Requirements and Testing in Agile: an Industrial Experience
  • Health Care Information Systems: A Crisis Approach
  • Using Correct-by-Construction Software Agile Development
  • Part IX Health, Bioinformatics, Pattern Detection and Optimization
  • Benefits of Establishing Makerspaces in Distributed Development Environment
  • Semantic Description of Healthcare Devices to Enable Data Integration
  • Applying transfer learning to QSAR regression models
  • Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine
  • A Complete Diabetes Management and Care System
  • On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring
  • Part X Potpourri
  • Smart Lighting Controlling System: Case Study of Yarmouk University Museum
  • Incremental Topology Generated for ANN A Case Study on a Helicopter’s Flight Simulation
  • Degree Aware Triangulation of Annular Regions
  • Heuristic Approaches for the Open-Shop Scheduling Problem
  • Continuous State Power-down Systems for Renewable Energy Management
  • Deep Packet Inspection: A Key Issue for Network Security
  • What Petya/NotPetya Ransomware is and What its Remidiations are
  • Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform
  • New Techniques for Public Key Encryption with Sender Recovery
  • Cloud Intrusion Detection and Prevention system for M-voting application in South Africa
  • Protecting Personal Data with Blockchain Technology
  • The Role of CAE-CDE in Cybersecurity Education for Workforce Development
  • Software Optimizations for DES
  • Part II Networking and Wireless Communications
  • Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment
  • End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks
  • Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges
  • A Dual canister medicine IoT Dispenser
  • Part I Cybersecurity
  • Safeguarding Personal Health Information: Case Study
  • Cybersecurity as People Powered Perpetual Innovation
  • Performance Study of the Impact of Security on 802.11ac Networks
  • Training Neural Tensor Networks with the Never Ending Language Learner
  • PERIA-Framework: A Prediction Extension Revision Image Annotation Framework
  • The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan
  • Evaluating Cyber Threats to the United Kingdom’s National Health Service (NHS) Spine Network
  • A Virtual Animated Commentator Architecture for Cybersecurity Competitions
  • Malicious Software Classification using VGG16 Deep Neural Network’s Bottleneck Features
  • Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach)
  • A Self Proxy Signature Scheme over NTRU Lattices
  • Towards an Ontology of Security Assessment: a core model proposal
  • Integration of Mobile Forensic Tool Capabilities
  • Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services
  • Improving Agile Software Development with Domain Ontologies
  • A Stratified Sampling Algorithmfor Artificial Neural Networks
  • Part V Data Mining/Machine Learning
  • Mining ENADE Data from the Ulbra Network Institution
  • Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)
  • Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise
  • Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets
  • Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series
  • DeRis: Information system supporting the prediction of default risk in companies
  • Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems
  • Part XI Short Papers
  • Customer services management and satisfaction of Internet-related banking of First National Bank
  • BIG IoT – Interconnecting IoT Platforms from different domains - First success story
  • Cross-Cultural Perspective of E-Commerce
  • Website Usability Requirements: Through the Lens of Individual’s Perception
  • Methods of Ensuring the Reliability and Fault Tolerance of Information Systems
  • Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise
  • Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly
  • A Classifier Evaluation for Payments’ Default Predictions in a Brazilian Retail Company
  • Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review
  • Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus)
  • Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm
  • Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics
  • A model for hour-wise prediction of mobile device energy availability
  • Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model
  • A Traffic Light Recognition Device
  • An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment
  • Reproducible Research in Document Analysis and Recognition
  • Music Genre Classification using Data Mining and Machine Learning
  • Improving word representations using Paraphrase dataset
  • A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions
  • Dual Long Short-Term Memory Networks for Sub-Character Representation Learning
  • Business Intelligence Dashboard Application for Insurance Cross Selling