default search action
18th SNPD 2017: Kanazawa, Japan
- Teruhisa Hochin, Hiroaki Hirata, Hiroki Nomiya:
18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2017, Kanazawa, Japan, June 26-28, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-5504-3
Keynote
- Liz Bacon:
Intelligent and immersive systems for mass education: Keynote address. 1 - Hyun Yoe:
Smart farming: ICT based agriculture: Keynote address. 3
Artificial Intelligence
- Duangjai Jitkongchuen, Warattha Sukpongthai, Arit Thammano:
Weighted distance grey wolf optimization with immigration operation for global optimization problems. 5-9 - Amarita Ritthipakdee, Arit Thammano:
Primate swarm algorithm for continuous optimization problems. 11-15 - Mingchang Chih:
A three-ratio SACRO-based particle swarm optimization with local search scheme for the multidimensional knapsack problem. 17-22 - Daranat Tansui, Arit Thammano:
Nature-inspired optimization method: Hydrozoan algorithm for solving continuous problems. 23-28 - Pongpanut Osathitporn, Nuanwan Soonthornphisaj, Wiwat Vatanawood:
A scheme of criminal law knowledge acquisition using ontology. 29-34 - Nyein Pyae Pyae Khin, Khin Thidar Lynn:
Medical concept extraction: A comparison of statistical and semantic methods. 35-38 - Yaning Li, Xuelei Wang, Jie Tan, Chengbao Liu, Xiwei Bai:
Intelligent integrated coking flue gas indices prediction. 39-45 - Wannaporn Teekeng, Pornkid Unkaw:
A new hybrid model of PSO and DE algorithm for data classification. 47-51 - Wenjun Bai, Changqin Quan, Zhiwei Luo:
Alleviating adversarial attacks via convolutional autoencoder. 53-58 - Koya Kawashima, Wenjun Bai, Changqin Quan:
Text mining and pattern clustering for relation extraction of breast cancer and related genes. 59-63 - Kui Chen, Hitoshi Kanoh:
A discrete firefly algorithm based on similarity for graph coloring problems. 65-70
Audio and Video Technology
- Tin-Tin Yu, Nu War:
Condensed object representation with corner HOG features for object classification in outdoor scenes. 77-82 - Kai Ki Lee, Ying Kin Yu, Kin Hong Wong:
Recovering camera motion from points and lines in stereo images: A recursive model-less approach using trifocal tensors. 83-90 - Nay Chi Lynn, Zin Mar Kyu, Thi Thi Zin, Ikuo Kobayashi:
Estimating body condition score of cows from images with the newly developed approach. 91-94
Communication Systems and Networks
- Shuji Jinbo, Bahaa Aldeen Alghazawy, Satoshi Fujita:
Batch-based flash crowd relaxation in cloud-assisted P2P live streaming. 95-100 - Bassey Isong, Tebogo Kgogo, Francis Lugayizi, Bennett Kankuzi:
Trust establishment framework between SDN controller and applications. 101-107
Component-Based Software Engineering
- Srinual Nalintippayawong, Kanokwan Atchariyachanvanich, Thanakrit Julavanich:
DBLearn: Adaptive e-learning for practical database course - An integrated architecture approach. 109-114
Cryptography and Network Security
- Zhijian Wang, Yanqin Zhu:
A centralized HIDS framework for private cloud. 115-120 - Chong Fu, Zhou-feng Chen, Wei Zhao, Hui-yan Jiang:
A new fast color image encryption scheme using chen chaotic system. 121-126 - Yi Yi Aung, Myat Myat Min:
An analysis of random forest algorithm based network intrusion detection system. 127-132
Data Mining and Machine Learning
- Mwana Said Omar, Alexander Muriuki Njeru, Sun Yi:
The influence of Twitter on education policy making. 133-136 - Amani Dello, Chika Yoshida:
Online tendering and evaluation for public procurement in Tanzania. 137-141 - Lilia Lazli, Mounir Boukadoum, Otmane Aït Mohamed:
Hybrid possibilistic-genetic technique for assessment of brain tissues volume: Case study for Alzheimer patients images clustering. 143-147 - Pyae Phyo Thu, Nwe New:
Implementation of emotional features on satire detection. 149-154 - Htwe Nu Win, Khin Thidar Lynn:
Community detection in Facebook with outlier recognition. 155-159 - Taketo Tsunoda, Hironori Washizaki, Yoshiaki Fukazawa, Sakae Inoue, Yoshiiku Hanai, Masanobu Kanazawa:
Evaluating the work of experienced and inexperienced developers considering work difficulty in sotware development. 161-166 - Masashi Shuto, Hironori Washizaki, Katsuhiko Kakehi, Yoshiaki Fukazawa, Shoso Yamato, Masashi Okubo, Bastian Tenbergen:
Relationship between the five factor model personality and learning effectiveness of teams in three information systems education courses. 167-174 - Yuhan Dong, Siyuan Qian, Kai Zhang, Yongzhi Zhai:
A novel passenger hotspots searching algorithm for taxis in urban area. 175-180 - Rian Adam Rajagede, Chandra Kusuma Dewa, Afiahayati:
Recognizing Arabic letter utterance using convolutional neural network. 181-186 - Dapeng Liu, Shaochun Xu, Brian Zhang, Chunlin Wang, Chunqing Li, Feng Zhou:
Issues with conducting controlled on-line experiments for E-Commerce. 187-192
Database System Management
- Benjamas Panyangam, Suttipong Surak, Sangapong Panyakeaw:
Simplify methodology for developing VR applications based on shared VR materials. 193-198 - Poonyanuch Khumnin, Twittie Senivongse:
SQL antipatterns detection and database refactoring process. 199-205
E-Commerce and its applications
- Krittika Akasarakul, Nagul Cooharojananone, Rajalida Lipikorn:
A study of factors influencing intention to purchase local community product on E-Commerce website: The case of One Tambon One Product (OTOP) in Thailand. 213-218
Image, Speech, and Signal Processing
- Md. Shahidul Islam, Russel Pears, Boris Bacic:
Detecting precursor patterns for frequency fluctuation in an electrical grid. 219-224 - Hnin Mya Aye, Sai Maung Maung Zaw:
Histogram of Accumulated Changing Gradient Orientation (HACGO) for saliency navigated action recognition. 225-230 - Manop Phankokkruad, Phichaya Jaturawat:
Influence of facial expression and viewpoint variations on face recognition accuracy by different face recognition algorithms. 231-237 - Tin Tin San, Nu War:
Local stereo matching under radiometric variations. 245-249 - Khine Zar Thwe, Nu War:
Environmental sound classification based on time-frequency representation. 251-255 - Narongsak Putpuek, Nagul Cooharojananone, Shin'ichi Satoh:
A modification of retake detection using simple signature and LCS algorithm. 257-261 - Duan-Yu Chen, Jyun-Ci Lai:
HHT-based remote respiratory rate estimation in thermal images. 263-268
Internet Technology and Applications
- Noraset Noradachanon, Twittie Senivongse:
Decision model for identity management product selection using fuzzy AHP. 269-275 - Lakmal Meegahapola, Roshan Alwis, Eranga Nimalarathna, Vijini Mallawaarachchi, Dulani Meedeniya, Sampath Jayarathna:
Optimizing change detection in distributed digital collections: An architectural perspective of change detection. 277-282 - Sirikwan Treetippayaruk, Twittie Senivongse:
Security vulnerability assessment for software version upgrade. 283-289
Mobile/Wireless/Ad-Hoc Networks
- Wei Kuang Lai, Mei-Tso Lin:
Burst transmission and frame aggregation for inter-vehicle communications. 291-296 - Yanfei Wu, Yanqin Zhu, Zhe Yang:
Routing algorithm based on ant colony optimization for mobile social network. 297-302 - Ning Sun, Jiahao Xu, Hailong Wei, Hongxia Miao, Jin Wang:
A network state based reliability evaluation model for WSNs. 303-308 - Weixu Chen, Hongxia Miao, Juan Liu, Bensheng Qi, Ning Sun:
Actuators task assignment algorithm and its application for WSAN. 309-313
Natural Language Processing
- Teerapong Leelanupab, Orapin Anonthanasap:
Learning and immediate retention of Japanese vocabulary using generated mnemonic keywords. 315-320 - Yu Mon Aye, Sint Sint Aung:
Sentiment analysis for reviews of restaurants in Myanmar text. 321-326
Neural Networks & Genetic Algorithms
- Alfian Akbar Gozali, Shigeru Fujimura:
Performance analysis of localization strategy for island model genetic algorithm. 327-332 - Dongqing Zhao, Claus Aranha, Hitoshi Kanoh:
Solving real-world facility layout problems using GA with Levy Flights and multi-decoding. 333-338
Optimizing compilers & program translation
- Islem Kaabachi, Dorra Jriji, Saoussen Krichen:
An improved ant colony optimization for green multi-depot vehicle routing problem with time windows. 339-344
Parallel and Distributed Computing
- Panagiota Galanakou, Theodora Leventouri, Alexandros Georgakilas, Georgios Kalantzis:
A parallelized GPU-based simulating annealing algorithm for intensity modulated radiation therapy optimization. 345-350 - Masashi Shiraishi, Atsuo Ozaki, Shusuke Watanabe:
Optimistic parallel simulation engine for predicting future situations incorporating observation data. 351-356 - Taisuke Ono, Hasitha Muthumala Waidyasooriya, Masanori Hariyama, Tsukasa Ishigaki:
Architecture of an FPGA accelerator for LDA-based inference. 357-362 - Kasidit Chanchio, Phithak Thaenkaew:
Performance comparisons and data compression of time-bound live migration and pre-copy live migration of virtual machines. 363-368
Software Specification & Architecture
- Theeraporn Suphakul, Twittie Senivongse:
Development of privacy design patterns based on privacy principles and UML. 369-375 - Charnon Pattiyanon, Twittie Senivongse:
Quality model for assessing object-oriented design patterns under development. 377-383 - Paul Lavery, Takuo Watanabe:
An actor-based runtime monitoring system for web and desktop applications. 385-390
Software Testing
- Chunye Du, Wei Song, Jianhua Wu:
Based on the analysis of mobile terminal application software performance test. 391-395 - Hongliang Liang, Shirun Liu, Yini Zhang, Meilin Wang:
Improving the precision of static analysis: Symbolic execution based on GCC abstract syntax tree. 395-400
Web-Based Applications
- Shuji Jinbo, Bahaa Aldeen Alghazawy, Satoshi Fujita:
Batch-based flash crowd relaxation in cloud-assisted P2P live streaming. 401-406 - Panagiota Galanakou, Theodora Leventouri, Alexandros Georgakilas, Georgios Kalantzis:
A parallelized GPU-based simulating annealing algorithm for intensity modulated radiation therapy optimization. 407-412 - Wei Kuang Lai, Mei-Tso Lin:
Burst transmission and frame aggregation for inter-vehicle communications. 413-418 - Yang Xu, Shuwen Liu, Binglu Wang, Tianyi Liu, Zhengnan Liu:
Share-housing allocation information service system based on Pareto optimality. 419-424 - Alfian Akbar Gozali, Shigeru Fujimura:
Performance analysis of localization strategy for island model genetic algorithm. 425-430 - Ning Sun, Hongxi Bai, Yuxia Geng, Huizhu Shi:
Price evaluation model in second-hand car system based on BP neural network theory. 431-436
Special Session 1: System Organization and Optimization for Big Data Analysis
- Kohei Fujisawa, Atsushi Nunome, Kiyoshi Shibayama, Hiroaki Hirata:
A software implementation of speculative memory. 437-443 - Sekai Ichii, Shohei Hayashi, Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama:
Performance evaluation of delayed-committing transactional memory. 445-451 - Shingo Shimano, Atsushi Nunome, Yuta Yokoi, Kiyoshi Shibayama, Hiroaki Hirata:
An autonomous configuration scheme of storage tiers for distributed file system. 453-458 - Ken Higuchi, Makoto Yoshida, Tatsuo Tsuji, Naoyuki Miyamoto:
Correctness of the routing algorithm for distributed key-value store based on order preserving linear hashing and skip graph. 459-464
Special Sesssion 2: Experiences of Software Engineering and Artificial Intelligence
- Takuhiro Kagawa, Sachio Saiki, Masahide Nakamura:
Developing personalized security information service using open data. 465-470 - Naoya Nitta:
Experiences of debugger-based architecture comprehension. 471-476 - Long Niu, Sachio Saiki, Masahide Nakamura:
Recognizing ADLs of one person household based on non-intrusive environmental sensing. 477-482 - Tomohiro Fujita, Wenjun Bai, Changqin Quan:
Long short-term memory networks for automatic generation of conversations. 483-487 - Shohei Miyashita, Xinyu Lian, Xiao Zeng, Takashi Matsubara, Kuniaki Uehara:
Developing game AI agent behaving like human by mixing reinforcement learning and supervised learning. 489-494 - Yuusuke Kataoka, Takashi Matsubara, Kuniaki Uehara:
Automatic manga colorization with color style by generative adversarial nets. 495-499
Special Session 3: Marketing & Management Science with Computational Intelligence
- Akiya Inoue, Kenichi Kitahara, Motoi Iwashita:
Mobile-carrier choice behavior analysis between three major mobile-carriers and mobile virtual network operators. 501-506 - Yusuke Makino, Kazuhiko Kato, Shigeaki Tanimoto:
The unpredictable structure of risk chains using association rule mining. 507-511 - Motoi Iwashita:
Transitional approach to evaluate customer satisfaction for e-Books. 513-518
Special Session 4: Advanced Information Management for Affective and Human-centered Information Systems
- Hayato Kumagai, Teruhisa Hochin, Hiroki Nomiya:
Retrieval and synchronized playback methods considering temporal harmony of music and video clips. 519-524 - Takayuki Yoshida, Teruhisa Hochin, Hiroki Nomiya:
Automatic composition using melodic outlines and music theory. 525-530 - Tomoki Maeda, Teruhisa Hochin, Hiroki Nomiya:
Towards cooperation between multiple video retrieval systems based on impression. 531-536 - Yuto Shinjo, Teruhisa Hochin, Hiroki Nomiya:
Detecting changes of music impressions for changing pictures. 537-542 - Kotoko Yamaguchi, Teruhisa Hochin, Hiroki Nomiya, Yukiko Nishizaki:
Effect of the reality of pictures in a horror game on feelings of fear. 543-550 - Mitsuaki Maeda, Hiroki Nomiya, Shota Sakaue, Teruhisa Hochin, Yukiko Nishizaki:
Emotional video scene retrieval system for lifelog videos based on facial expression intensity. 551-556 - Dandan Yuan, Weiwei Du, Xiaojie Duan, Jianming Wang, Yanhe Ma, Hong Zhang:
Detection of slices including a ground-glass opacity nodule in CT volume data with semi-supervised learning. 557-561 - Qiyu Yang, Teruhisa Hochin, Hiroki Nomiya:
Differences of impression of pictures between Japanese and Chinese. 563-568
Special Session 5: Analysis, Evaluation, and Usage of Web Information, System Behaviors, and Human Actions
- Tsuyoshi Tomioka, Makoto Hasegawa, Shojiro Shiraishi:
A study of social graph analysis for preschool education using face authentication: Pruning for centrality optimization in graph analysis. 569-574 - Hideya Nakanishi, Teruhisa Hochin, Hiroki Nomiya, Hideki Shiroshita:
Revised similarity retrieval method of plasma emission videos and its evaluation. 575-580 - Tian Nie, Yi Ding, Chen Zhao, Youchao Lin, Takehito Utsuro, Yasuhide Kawada:
Clustering search engine suggests by integrating a topic model and word embeddings. 581-586 - Akihiko Sada, Naoshi Sakamoto:
A user interface utilizing various contents in difficult environment. 593-599 - Daisuke Kimoto, Teruhisa Hochin, Hiroki Nomiya:
Integrated usage of different knowledge sources in life science. 601-606 - Pham Truong Hong Ngan, Teruhisa Hochin, Hiroki Nomiya:
Similarity measure of human body movement through 3D chaincode. 607-614 - Matthew J. Bailey, Connor Collins, Matthew Sinda, Gongzhu Hu:
Intrusion detection using clustering of network traffic flows. 615-620 - Tokuro Matsuo, Hidekazu Iwamoto:
Analysis of motivation of convention participants and proposal of attendance management system. 621-626 - Rieko Fujita, Tokuro Matsuo, Teruhisa Hochin:
How catchphrases are percepted by human? 627-632
Special Session 6: Evolutionary Computation and Its Application
- Yudai Kuwahata, Jun-ichi Kushida, Satoshi Ono:
A fundamental study on adaptive surrogate-assisted evolutionary computation using rank correlation. 633-638 - Tomoko Kashima, Hiroshi Someya, Yukiko Orito:
Effectiveness of evaluation function and permutation GA in multimodal consecutive meals planning. 639-644 - Kota Nomura, Makoto Fukumoto:
Asynchronous distributed interactive genetic algorithm for creating music melody reflecting multiple users' feelings. 645-650 - Muneyuki Unehara, Yoshiki Ekihiro, Eriko Matsumoto, Koichi Yamada, Izumi Suzuki:
Interactive decoration design support system by fitness evaluation based on design knowledge and subjective evaluation. 651-656 - Ken Ishibashi:
The effectiveness of random selection for IGA-based texture search. 657-662 - Makoto Fukumoto, Kota Nomura:
A proposal of interactive Tabu Search with paired comparison and differential vector for creating fragrance. 663-668 - Nasrin Evazzadeh Mohammadiyan, Azam Ghaedi:
Enhancing the accuracy of firefly algorithm by using the reproduction mechanism. 1-6 - Parinya Wichawong, Prabhas Chongstitvatana:
Knowledge management system for failure analysis in hard disk using case-based reasoning. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.