Default Cover Image

2017 International Conference on Computational Science and Computational Intelligence (CSCI)

Dec. 14 2017 to Dec. 16 2017

Las Vegas, NV, USA

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
Deep Learning Approach to Malware Multi-class Classification Using Image Processing TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
Security Mechanisms for Signaling in WebRTC-Based Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
Security Evaluation of an Airbag-ECU by Reusing Threat Modeling ArtefactsFull-text access may be available. Sign in or learn about subscription options.pp. 37-43
Security Governance, Management and Strategic Alignment via CapabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 44-49
An Integrated Mechanism for Resetting Passwords in Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 50-54
A Mathematical Model of Mitigating Memory Randomization Weakness via Moving Target DefenseFull-text access may be available. Sign in or learn about subscription options.pp. 61-67
DynamicPIN: A Novel Approach towards Secure ATM AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
Security Mental Model: Cognitive Map ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 74-79
Enhancing Trojan Detection by Finding LTL and Taint Properties in RTL Circuit Designs: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
ESeizure: A Mobile App for Digital Forensics First RespondersFull-text access may be available. Sign in or learn about subscription options.pp. 86-90
Drone Forensics: Digital Flight Log Examination Framework for Micro DronesFull-text access may be available. Sign in or learn about subscription options.pp. 91-96
Hunting Malware: An Example Using Gh0stFull-text access may be available. Sign in or learn about subscription options.pp. 97-102
Anonymity of TOR Users DemystifiedFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Dynamic Re-planning for Cyber-Physical Situational AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Analyzing the Effect of Ransomware Attacks on Different IndustriesFull-text access may be available. Sign in or learn about subscription options.pp. 121-126
Stochastic Path Finding under CongestionFull-text access may be available. Sign in or learn about subscription options.pp. 135-140
An Efficient Storage Format for Storing Configuration Interaction Sparse Matrices on CPU/GPUFull-text access may be available. Sign in or learn about subscription options.pp. 141-147
Adaption of Levenshtein Algorithm for Albanian LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 148-151
Improving Lives through Donation AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 152-157
Calculating Persistence Homology of Attractors in High-Dimensional Chaotic SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 158-160
A Conceptual Framework for Battery Storage Integration into the Electric GridFull-text access may be available. Sign in or learn about subscription options.pp. 161-167
Proposition of a method for assessing similarity between two ontologiesFull-text access may be available. Sign in or learn about subscription options.pp. 174-179
Online Updating for Gaussian Process LearningFull-text access may be available. Sign in or learn about subscription options.pp. 180-183
New Techniques to Solve Differential Equations AutomaticallyFull-text access may be available. Sign in or learn about subscription options.pp. 184-189
Numerical and Evolutionary Approaches for the Optimization of Electrical Microgrid Control ParametersFull-text access may be available. Sign in or learn about subscription options.pp. 190-195
Unsolved Lattice Path Problems in Computational ScienceFull-text access may be available. Sign in or learn about subscription options.pp. 196-201
Computation in Markoff-Hurwitz Equations IIFull-text access may be available. Sign in or learn about subscription options.pp. 207-212
Solving Minimum K-Supplier in Adleman-Lipton ModelFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
From Blockchain to Internet-Based VotingFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Computer Aided Writing — A Prototype of an Intelligent Word Processing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 234-239
An Occam's Razor Approach to Hedonic Pricing TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 240-245
Mapping Innovations in Artificial Intelligence through Patents: A Social Data Science PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 252-257
Stochastic Local-to-Global Methods for Air Quality PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 258-260
A Method to Use Power Generated from a Solar Energy GeneratorFull-text access may be available. Sign in or learn about subscription options.pp. 261-262
Filter Optimization for Enhancing Transformed VoiceFull-text access may be available. Sign in or learn about subscription options.pp. 263-266
Research Experience on the DC House Project for Rural ElectrificationFull-text access may be available. Sign in or learn about subscription options.pp. 267-270
vcBalancer: Dynamic Volunteer Manager for Self-Adaptive Task PullingFull-text access may be available. Sign in or learn about subscription options.pp. 271-274
Analyze Unstructured Data Patterns for Conceptual RepresentationFull-text access may be available. Sign in or learn about subscription options.pp. 275-278
A Genetic Algorithm Based Approach for Data Fusion at Grammar LevelFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
Opinion Mining Techniques and Tools: A Case Study on an Arab NewspaperFull-text access may be available. Sign in or learn about subscription options.pp. 292-296
Agent-Based Models Predicting Collective BehaviorsFull-text access may be available. Sign in or learn about subscription options.pp. 297-302
Bio-inspired Neural Network Model Applied to Urban TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 303-308
Graph Based AHC Algorithm for Text ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 309-314
Fuzzy System for Human Resource Performance EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 315-321
Graph Based KNN for Text SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 322-327
GSO: A New Solution for Solving Unconstrained Optimization Tasks Using Garter Snake's BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 328-333
Movie Master: Hybrid Movie RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 334-339
Predicting Personal Transitional Location Based on Modified-SVMFull-text access may be available. Sign in or learn about subscription options.pp. 340-344
Extraction of the Essential Constituents of the S&P 500 IndexFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Educational Data Mining Based on Multi-objective Weighted Voting Ensemble ClassifierFull-text access may be available. Sign in or learn about subscription options.pp. 357-362
A Deep Dive into Automatic Code Generation Using Character Based Recurrent Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 369-374
A Multivariate Discretization Algorithm Based on Multiobjective OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 375-380
A Fuzzy Controller for Fault Tolerant Control of Nuclear ReactorFull-text access may be available. Sign in or learn about subscription options.pp. 387-390
Deep Learning Empirical Topology for Classical Music Style Decision MakingFull-text access may be available. Sign in or learn about subscription options.pp. 394-395
A Fast Incremental Spectral Clustering Algorithm for Image SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 402-407
A Survey on Audio Content-Based ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 408-413
Age Estimation with Local Statistical Biologically Inspired FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
FaceNet Based Face Sketch RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 432-436
Facial Action Unit Recognition Using Data Mining Integrated Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 437-443
Flood Event Recognition from Images Based on CNN and SemanticsFull-text access may be available. Sign in or learn about subscription options.pp. 450-455
Identification of Cashmere/Wool Based on Pairwise Rotation Invariant Co-occurrence Local Binary PatternFull-text access may be available. Sign in or learn about subscription options.pp. 463-467
Multi-camera Smart Surveillance SystemFull-text access may be available. Sign in or learn about subscription options.pp. 468-472
Facial Recognition: A Combined Approach Utilizing CICA, PCA, and FFTFull-text access may be available. Sign in or learn about subscription options.pp. 479-483
Object Movement Detection by Real-Time Deep Learning for Security Surveillance CameraFull-text access may be available. Sign in or learn about subscription options.pp. 484-488
Analytic Signal Decomposition Using M-Channel Signal Matched Filter BankFull-text access may be available. Sign in or learn about subscription options.pp. 501-504
Edge Detection Using Spectral Intrinsic DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 505-509
Hand Motion Recognition Based on a 3D Fingertip Detection Fusion MethodFull-text access may be available. Sign in or learn about subscription options.pp. 510-515
Hierarchical-Dynamic Embedding for Zero-Shot Object RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 520-525
Real Time Eye Gaze EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 526-531
Real-Time Hand Gesture Recognition Based on a Fusion Learning MethodFull-text access may be available. Sign in or learn about subscription options.pp. 535-540
Review of Person Re-identification MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 541-546
A Content-Aware Quantisation Mechanism for Transform Domain Distributed Video CodingFull-text access may be available. Sign in or learn about subscription options.pp. 547-553
Automated Diagnosis of Retinal Edema from Optical Coherence Tomography ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 554-557
Learning via Decision Trees Approach for Video Super-ResolutionFull-text access may be available. Sign in or learn about subscription options.pp. 558-562
Showing 100 out of 340