


default search action
15th ICIS 2016: Okayama, Japan
- 15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016, Okayama, Japan, June 26-29, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0806-3

Keynote
- Hiroyuki Tarumi:

Remote entertainment performances and social feedbacks. 1 - Yeong-Tae Song:

Toward connected personal healthcare: Keynote address. 1-2
Toward Connected Personal Healthcare
- Simon Xu:

Static approaches for concept location during software evolution. 1
Communication Systems & Networks
- Hsung-Pin Chang

, Tsung-Yu Yeh:
A software-based fault detection scheme for wireless sensor networks. 1-6 - Na Wang, DongQian Liu:

Trust model based on changeable sampling frequency for wireless sensor network. 1-4 - Daisuke Mitsunaga, Thae Thae Yu Khine, Hua-An Zhao:

A low complexity ZF-based lattice reduction detection using curtailment parameter in MIMO systems. 1-5 - Thae Thae Yu Khine, Koji Araki, Daisuke Mitsunaga, Hua-An Zhao:

A nearest neighbor search algorithm for LR-LD on high SNR. 1-5 - Patrick Wan-Hin Luk, Ga Ching Lui, Kwok Yip Szeto:

Optimization of systemic stability of directed network using genetic algorithm. 1-6 - Ching-Lung Chang, Kuan-Yi Ho:

Slot assignment for TDMA MAC in industrial wireless sensor network. 1-5 - Yuusuke Ookita, Satoshi Fujita:

Cost-effective index poisoning scheme for P2P file sharing systems. 1-6 - Afef Ghabri, Leila Horchani

, Monia Bellalouna:
New fault tolerant strategy of wireless sensor network. 1-6 - Furqan Haider Qureshi

, Qasim Umar Khan
, Shahzad Amin Sheikh:
SEP performance of triangular QAM with SC and GSC spatial diversity over Rayleigh channels. 1-5
Control Systems, Intelligent Systems
- Bin-Han Liu, Jen-Hao Teng

, Yi-Cheng Lin:
Smart Time-Division-Multiplexing control strategy for voltage multiplier rectifier. 1-6 - Ching-Min Lee:

Analysis and control for discrete-time singular systems with interval time-varying delay. 1-5 - Yaning Li, Xuelei Wang, Jie Tan:

Modeling of integrated processes for coking flue gas desulfurization and denitrification based on RBFNN. 1-6 - D. A. Irosh P. Fernando

, Frans A. Henskens:
The select and test algorithm for inference in medical diagnostic reasoning: Implementation and evaluation in clinical psychiatry. 1-9
Computer Architecture and VLSI
- Gwan-Hwan Hwang, Shang-Yu Yeh:

Proof of violation for availability in cloud systems. 1-7 - Abdul Mateen, Adia Khalid, Lal Khan, Sehrish Majeed, Tooba Akhtar:

Vigorous algorithms to control urban vehicle traffic. 1-5 - Mohammed Mreea, Kumudu S. Munasinghe

, Dharmendra Sharma
:
A strategic decision value model for cloud computing in Saudi Arabia's public sector. 1-7 - Hasitha Muthumala Waidyasooriya, Masanori Hariyama:

FPGA-based deep-pipelined architecture for FDTD acceleration using OpenCL. 1-6 - Hasitha Muthumala Waidyasooriya, Masanori Hariyama, Kota Kasahara

:
Architecture of an FPGA accelerator for molecular dynamics simulation using OpenCL. 1-5 - BaoKang Wang, Yuki Fukazawa, Toshio Kondo, Takahiro Sasaki:

A cache memory with unit tile and line accessibility. 1-6
Data Mining, Data Warehousing & Database
- Chung-Ping Young, Yen-Bor Lin, Ting-Ying Wei:

VOSync: An implementation of synchronization system for the virtual orchestra. 1-6 - Hsuan-Han Chang, Kuan-Ting Chen, Pao-Lien Lai:

Systematic approaches to embed cycles in balanced hypercubes. 1-5 - Preeti Bansal, Durga Toshniwal:

Analyzing civic complaints for proactive maintenance in smart city. 1-6 - Artinat Wattanaburanon, Nakornthip Prompoon:

Method for classifying usability qualities and problems for action games from user reviews using text mining. 1-6 - Issariya Uboltham, Nakornthip Prompoon, Wirichada Pan-ngum

:
AKIHelper: Acute kidney injury diagnostic tool using KDIGO guideline approach. 1-6 - Mohammad Hanif Gharanai:

Shaping the Afghan learning settings and power to the learners through a high-tech library management system. 1-6 - Bushra Alhijawi

, Yousef Kilani
:
Using genetic algorithms for measuring the similarity values between users in collaborative filtering recommender systems. 1-6 - Naveen Mysore:

An elastic group recommendation system designed for multivariate dynamic attributes. 1-6 - Takafumi Nakanishi

, Ryotaro Okada
, Takashi Kitagawa:
Automatic media content creation system according to an impression by recognition-creation operators. 1-6
Investment Pattern Clustering Based on Online P2PLending Platform
- Nianlong Luo, Fan Shen:

Investment pattern clustering based on online P2P lending platform. 1-6 - Tousif Osman

, Maisha Mahjabeen, Shahreen Shahjahan Psyche, Afsana Imam Urmi, J. M. Shafi Ferdous, Rashedur M. Rahman
:
Adaptive food suggestion engine by fuzzy logic. 1-6 - Ruhul Amin Dicken, S. A. M. Fazle Rubby, Sheefta Naz, A. M. Arefin Khaled, Ashraful Azad, Rashedur M. Rahman

:
Risk assessment of the top five malignancies among males and females with respect to occupation, educational status and smoking habits. 1-6 - Md. Saidur Rahman, Md. Saifur Rahman, Shahnewaz Ul Islam Chowdhury, Ashfaq Mahmood, Rashedur M. Rahman

:
A personalized music recommender service based on Fuzzy Inference System. 1-6 - Sumit Singh, Durga Toshniwal, Akhil Gupta, Shreyas Verma:

GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits. 1-6 - Fahim Jawad, Tawsif Ur Rahman Choudhury, S. M. Asif Sazed, Shamima Yasmin, Kanaz Iffat Rishva, Fouzia Tamanna, Rashedur M. Rahman

:
Analysis of Optimum Crop Cultivation using Fuzzy System. 1-6 - Jutamard Kawises, Wiwat Vatanawood:

A development of RDF data transfer and query on Hadoop Framework. 1-4 - Yeming Tang

, Qiuli Tong:
BordaRank: A ranking aggregation based approach to collaborative filtering. 1-6 - Aurawan Imsombut, Chaloemphon Sirikayon:

An alternative technique for populating Thai tourism ontology from texts based on machine learning. 1-4
Knowledge Discovery, Neural Networks and Genetic Algorithms
- Yushan Hsu, Ming-Fu Hsu, Sin-Jin Lin:

Corporate risk estimation by combining machine learning technique and risk measure. 1-4 - Kanjana Ruttanateerawichien, Werasak Kurutach, Tantikorn Pichpibul:

A new efficient and effective golden-ball-based technique for the capacitated vehicle routing problem. 1-5 - Jui-Yu Wu:

An evolutionary multi-layer perceptron neural network for solving unconstrained global optimization problems. 1-6 - Maitreyi Abhyankar, Arti Khaparde

, Vaidehi Deshmukh
:
Spatial domain decision based image fusion using superimposition. 1-6 - Emre Oner Tartan, Hamit Erdem:

A simple population based hybrid harmonic estimation algorithm. 1-6 - Bo-Ruei Peng, Shun-Chung Wang, Yi-Hua Liu, Huang Yan-Syun:

A Li-ion battery charger based on remaining capacity with fuzzy temperature control. 1-5 - Duangjai Jitkongchuen, Pongsak Phaidang, Piyalak Pongtawevirat:

Grey wolf optimization algorithm with invasion-based migration operation. 1-5 - Wei-Hao Huang, Shu-Hung Liao, Jen-Hao Teng

, Ting-Yen Hsieh, Bo-Ren Lan, Chih-Chieh Chiang:
Intelligent control scheme for output efficiency improvement of parallel inverters. 1-6 - Attawat Panich, Wiwat Vatanawood:

Detection of design patterns from class diagram and sequence diagrams using ontology. 1-6 - Nadra Ben Romdhane, Hazar Mliki

, Mohamed Hammami
:
An improved traffic signs recognition and tracking method for driver assistance system. 1-6 - Hiroyasu Usami

, Yuki Hanai, Yuji Iwahori
, Kunio Kasugai:
3D shape recovery of polyp using two light sources endoscope. 1-6 - Ya-Ting Lee, Teng-Shung Chiang, Chian-Song Chiu:

Neural network data modeling and its application on effect analysis of head and shoulder acupoint massage. 1-6 - Hong He, Xiaowen Yan, Wei Wei:

Meridian ECG information transmission system modeling using NARX neural network. 1-6 - Michael Manuel Smith, Yun-Shiow Chen:

A novel evolutionary algorithm for the homogeneous Probabilistic Traveling Salesman Problem. 1-6 - Ghofrane Rehaiem, Hamza Gharsellaoui, Samir Ben Ahmed

:
A neural networks based approach for the real-time scheduling of reconfigurable embedded systems with minimization of power consumption. 1-6 - Bin Zhang, Changqin Quan

, Fuji Ren:
Study on CNN in the recognition of emotion in audio and images. 1-5 - Xiao Sun

, Chongyuan Sun, Fuji Ren, Fang Tian, Kunxia Wang:
Emotional element detection and tendency judgment based on mixed model with deep features. 1-6 - Honglu Zhou, Mingli Song:

An improvement of partheno-genetic algorithm to solve multiple travelling salesmen problem. 1-6 - Kohei Arimoto, Hidenori Watanave:

Visualization of hierarchicaltransaction network. 1-4 - Satoshi Shimizu, Kazuaki Yamaguchi, Toshiki Saitoh

, Sumio Masuda:
A fast heuristic for the minimum weight vertex cover problem. 1-5 - Na Jia, Chi Xu, Huiqun Zhao:

Video annotation for players' tactics in sport competition. 1-6 - Houda Abadlia, Nadia Smairi, Khaled Ghédira:

A new proposal for a multi-objective technique using SMPSO and Tabu search. 1-6
Image Processing & Pattern Recognition
- Yen-Bor Lin, Chung-Ping Young:

An implementation of spatial algorithm to estimate the focus map from a single image. 1-5 - Xu-Mei Shen, Juxiang Zhou, Tianwei Xu:

Minority costume image retrieval by fusion of color histogram and edge orientation histogram. 1-7 - Ben-Zhong Lin, Chien-Chou Lin:

Pedestrian detection by fusing 3D points and color images. 1-5 - Muhammad Hassan Khan, Julien Helsper, Cong Yang, Marcin Grzegorzek

:
An automatic vision-based monitoring system for accurate Vojta-therapy. 1-6 - Chong Fu, Ou Bian, Hui-yan Jiang, Li-hui Ge, Hong-feng Ma:

A new chaos-based image cipher using a hash function. 1-9 - Daimu Oiwa, Shinji Fukui, Yuji Iwahori

, Tsuyoshi Nakamura, Manas Kamal Bhuyan:
Tracking with probabilistic background model by density forests. 1-6 - Noriaki Fujishima, Tatsuhiro Ietsuka:

Basic construction of a natural finger outline extraction system with a color glove. 1-6 - Jiung-Yao Huang, Su-Hui Lee, Chung-Hsien Tsai:

A fast image matching technique for the panoramic-based localization. 1-6 - Rinko Komiya, Takeshi Saitoh

, Miharu Fuyuno, Yuko Yamashita, Yoshitaka Nakajima:
Head pose estimation and movement analysis for speech scene. 1-5 - Warapon Chinsatitf, Takeshi Saitoh

:
Improvement of eye detection performance for inside-out camera. 1-6 - Jiung-Yao Huang, Hung-Ya Tsai, Chung-Hsien Tsai:

RETOP: A retinal topography keypoint descriptor. 1-6 - Yun-Te Lin, Ming-Long Huang, Chung-Ming Wang:

High dynamic range image composition using a linear interpolation approach. 1-6 - Dai Cao, Li-Fang Chen, Yuan Liu:

Solving jigsaw puzzle with symbol matrixes. 1-6 - Munkhjargal Gochoo

, Damdinsuren Bayanduuren, Uyangaa Khuchit, Galbadrakh Battur, Tan-Hsu Tan, Sy-Yen Kuo
, Shih-Chia Huang:
Design and application of novel morphological filter used in vehicle detection. 1-5 - Wei-Sung Chen

, Ming-Long Huang, Chung-Ming Wang:
Optimizing color transfer using color similarity measurement. 1-6
Internet Technology and Applications, E -Commerce
- Lu Ma, Gang Lu, Junxia Guo:

Observing the evolution of social network on Weibo by sampled data. 1-5 - Jen-Her Wu, Lifang Peng, Qi Li, Yi-Cheng Chen:

Falling in love with online shopping carnival on singles' day in China: An uses and Gratifications perspective. 1-6 - Piyaphan Pongpradit, Nakornthip Prompoon:

Constructing initial design patterns for online social network-based applications. 1-7 - Liping Li, Honghao Gao, Tang Shan:

An executable model and testing for Web software based on live sequence charts. 1-6 - Rene Kabalisa, Yves Cyuzuzo, Chika Yoshida, Ariane Ingabire:

e-Tegeko: A system that will boost citizens' participation on parliamentary regulations in Rwanda. 1-6 - Yves Cyuzuzo, Rene Kabalisa, Chika Yoshida, Joseph Muvara:

Automation system of vehicle requisition in public sector, Rwanda. 1-6 - Chen-Shu Wang, Shiang-Lin Lin:

Why are people willing to pay for cloud storage service? 1-6 - Harya Bima Dirgantara:

IT/IS strategic development for journalism system implementation on television industry: Study case on NET television station. 1-6 - Victor Njoroge Ngugi, Chika Yoshida:

Digital media platform to connect small and medium enterprises in Nairobi. 1-6 - Yun-Te Lin, Yi-Hao Hsiao, Fang-Pang Lin, Chung-Ming Wang:

A hybrid cache architecture of shared memory and meta-table used in big multimedia query. 1-6 - Mohammed Abdulkareem Alyami, Yeong-Tae Song:

Removing barriers in using personal health record systems. 1-8
Management Information Systems
- Srinual Nalintippayawong, Kanokwan Atchariyachanvanich

:
IT management status in public higher education institutions in Thailand. 1-5 - Tweheyo Pius Charles, Chika Yoshida:

Factors affecting the adoption of ICT in malnutrition monitoring. Case study: Western Uganda. 1-6 - Witchayarot Jantana, Peraphon Sophatsathit, Achara Chandrachai:

A multi-facet approach using conceptualization, application, and usability measurement to developing financial learning system for hospital. 1-5 - Asma Mejri, Sonia Ayachi Ghannouchi, Ricardo Martinho

, Feteh Elhadj:
Enhancing business process flexibility in an emergency care process. 1-6
Mobile/Wireless Computing
- Kailong Zhang, Liang Hu, Panfei Zuo, Xiao Wu, Kejian Miao:

Wireless extension mechanism and logic design for FPGA-based Ethernet Powerlink node. 1-7 - Min-Jhih Cheng, Shiu-Wan Hung, Her-Her Tsai, Ping-Wen Chen:

The adoption intentions of mobile applications. 1-3
Parallel and Distributed Computing & Systems
- Naoshi Sakamoto:

Parallel online exact sum for Java8. 1-8 - Ryuta Kawano

, Hiroshi Nakahara, Seiichi Tade, Ikki Fujiwara
, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano:
ACRO: Assignment of channels in reverse order to make arbitrary routing deadlock-free. 1-6 - Linli Wu, Zhangyi Shen, Xiang Feng:

Implementation of massive data processing architecture for electric enterprise groups. 1-6 - Kanchana Viriyapant, Sucha Smanchat:

A deadline-constrained scheduling for dynamic multi-instances parameter sweep workflow. 1-6 - Daisuke Fujishima, Tomio Kamada

:
Redistribution mechanism for associative distributed collections of objects. 1-6 - Zhuo Cheng, Haitao Zhang, Yasuo Tan, Yuto Lim

:
SMT-based scheduling for multiprocessor real-time systems. 1-7
Programming Languages, Compilers & Operating Systems
- Hao-Wei Peng, Jean Jyh-Jiun Shann:

Translating OpenACC to LLVM IR with SPIR kernels. 1-6 - Jatuporn Deesukying, Wiwat Vatanawood:

Generating of business rules for Coloured Petri Nets. 1-6 - Wafa Gabsi

, Bechir Zalila
, Mohamed Jmaiel:
AspectAda: An aspect oriented extension of ada for real-time systems. 1-6
Software Specification Techniques
- Haitao Zhang, Zhuo Cheng, Cong Tian, Yonggang Lu

, Guoqiang Li:
Verifying OSEK/VDX applications: An optimized SMT-based bounded model checking approach. 1-6 - Siwadol Sateanpattanakul:

Comments recovery approach for Java decompiler. 1-6 - Muhammad Ilyas Azeem, Siffat Ullah Khan

:
Practices for software integration success factors in GSD environment. 1-6 - Chaleerat Thamrongchote, Wiwat Vatanawood:

Business process ontology for defining user story. 1-4 - Shengbo Chen, Hao Fu, Huaikou Miao:

Formal verification of security protocols using Spin. 1-6 - Yongjin Seo, Hyeon Soo Kim

:
Operator-data type pair based execution environments independent worst-case execution time measuring method. 1-6 - Yongjin Seo, Eun Young Cheon, Jin-A. Kim, Hyeon Soo Kim

:
Techniques to generate UTP-based test cases from sequence diagrams using M2M (Model-to-Model) transformation. 1-6 - Bassey Isong

, Ifeoma U. Ohaeri, Munienge Mbodila
:
Supplementing Object-Oriented software change impact analysis with fault-proneness prediction. 1-8
Web Engineering & Applications
- Ying Zhang, Chaopeng Li, Shaowen Liu, Feng Wen, Liming Du, Hui He:

A unified approach to automate geospatial data retrieval using semantic web technologies. 1-6 - Mintra Ruensuk:

An implementation to reduce internal/external interruptions in Agile software development using pomodoro technique. 1-4 - Patsakorn Rittitum, Wiwat Vatanawood, Arthit Thongtak:

Digital scrum board using leap motion. 1-4 - Xun Lee, Jiaan Zhou, Hao Fu:

Usage pattern based survivability prediction of web system. 1-6 - Wutthichai Chansuwath, Twittie Senivongse:

A model-driven development of web applications using AngularJS framework. 1-6 - Pattariya Singpant, Nakornthip Prompoon:

Constructing patterns verification criteria based on quality attributes: Web security context patterns case study. 1-7
Special Session 1: On-chip Parallel and Network-Based Systems in the Big Data Era
- Kazuto Nakanishi, Teruhisa Hochin, Hiroki Nomiya:

Performance improvement of multi-dimensional indexing system for big data analysis. 1-6 - Ken Higuchi, Naoyuki Miyamoto, Tatsuo Tsuji, Makoto Yoshida, Kento Takehara:

Performance evaluation of routing algorithms for distributed key-value store based on order preserving linear hashing and Skip graph. 1-6 - Jiachao Zhang, Shunpei Yuasa, Shinji Fukuma, Shin-ichiro Mori:

A real-time GPU-based coupled fluid-structure simulation with haptic interaction. 1-6 - Hiroaki Hirata

, Atsushi Nunome
, Kiyoshi Shibayama:
Speculative memory: An architectural support for explicit speculations in multithreaded programming. 1-7 - Atsushi Nunome

, Hiroaki Hirata
, Kiyoshi Shibayama:
An interval control method for status propagation in an autonomous distributed storage system. 1-6
Special Session 2: Analysis, Evaluation, and Usage of Web Information, System Behaviors, and Human Actions
- Yuanyuan Wang

, Yukiko Kawai, Kazutoshi Sumiya, Yoshiharu Ishikawa
:
TweeVist: A geo-tweet visualization system for web based on spatio-temporal events. 1-6 - Hideki Shiroshita, Teruhisa Hochin, Hiroki Nomiya

, Hideya Nakanishi
:
Similarity retrieval method of plasma emission videos. 1-6 - Yuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya

:
Estimation of factor scores from feature values of english question and answer statements. 1-6 - Fuma Kizu, Teruhisa Hochin, Hiroki Nomiya

:
Consideration of validity of concurrency control program generated in genetic programming. 1-6 - Akira Suyama, Ushio Inoue:

Using geofencing for a disaster information system. 1-5 - Shan Liu, Mizuho Iwaihara:

Extracting representative phrases from Wikipedia article sections. 1-6 - Hiroshi Uehara, Mizuho Baba, Takehito Utsuro:

Utilizing texts of picture book reviews for extracting children's behavioral characteristics in language acquisition. 1-6 - Yiming Zhang, Mizuho Iwaihara:

Evaluating semantic relatedness through categorical and contextual information for entity disambiguation. 1-6 - Kenji Kogo, Kyoji Kawagoe, Teruhisa Hochin:

Music similarity retrieval method considering music arrangement. 1-6
Special Session3: Advanced Information Management for Affective and Human-centered Information Systems
- Yui Nonomura, Teruhisa Hochin, Hiroki Nomiya

:
Colors suitable to presentation slides. 1-6 - Yuya Watanabe, Teruhisa Hochin, Hiroki Nomiya

:
Method of similarity retrieval of color videos based on impressions. 1-6 - Kenshi Yoshimura, Teruhisa Hochin, Hiroki Nomiya

:
Searching optimal movements in multi-player games with imperfect information. 1-6 - Saeko Oshiba, Shunsuke Iki, Jun Yabuchi, Yoshikazu Mizutani, Kumiko Kawabata, Kanako Nakagawa, Yoji Kitani, Saori Kitaguchi, Kazunari Morimoto:

Visibility evaluation experiments of optical wireless pedestrian-support system using self-illuminating bollard. 1-6 - Youchao Lin, Mizuho Baba, Takehito Utsuro:

Generating a werewolf game log digest of inferring each player's role. 1-6 - Shunlin Rong, Mizuho Iwaihara:

A collective approach to ranking entities for mentions. 1-6 - Hayato Kumagai, Teruhisa Hochin, Hiroki Nomiya

:
Speeds of videos considering speeds of objects and background. 1-6 - Hiroki Nomiya

, Shota Sakaue, Teruhisa Hochin:
Recognition and intensity estimation of facial expression using ensemble classifiers. 1-6 - Makoto Fukumoto

, Takeshi Hatanaka:
Parallel distributed Interactive Genetic Algorithm for composing music melody suited to multiple users' feelings. 1-6
Special Session 4: Experiences of SoftwareEngineering 1
- Masateru Tsunoda, Akito Monden

, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Analysis of information system operation cost based on working time and unit cost. 1-6 - Kyohei Uemura, Yusuke Saito, Shin Fujiwara, Daiki Tanaka, Kenji Fujiwara

, Hajimu Iida, Kenichi Matsumoto:
A hosting service of multi-language historage repositories. 1-6 - Kenichi Ono, Masateru Tsunoda, Akito Monden

, Kenichi Matsumoto:
Influence of outliers on analogy based software development effort estimation. 1-6 - Masao Ohira, Hayato Yoshiyuki, Yosuke Yamatani:

A case study on the misclassification of software performance issues in an issue tracking system. 1-6 - Takashi Watanabe, Akito Monden

, Yasutaka Kamei, Shuji Morisaki:
Identifying recurring association rules in software defect prediction. 1-6 - Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada

, Akito Monden
:
A fuzzy hashing technique for large scale software birthmarks. 1-6
Special Session 5: Experiences of SoftwareEngineering 2
- Hayato Sagisaka, Haruaki Tamada

:
Identifying the applied obfuscation method towards de-obfuscation. 1-6 - Eva Gerbert-Gaillard, Stéphanie Chollet, Philippe Lalanda:

Model-driven approach for self-aware pervasive systems. 1-6 - Seiji Sakakibara, Sachio Saiki, Masahide Nakamura, Shinsuke Matsumoto:

Indoor environment sensing service in smart city using autonomous sensor box. 1-6 - Ryoma Tabata, Arisa Hayashi, Seiki Tokunaga, Sachio Saiki, Masahide Nakamura, Shinsuke Matsumoto:

Implementation and evaluation of BLE proximity detection mechanism for Pass-by Framework. 1-6 - Seiki Tokunaga, Hiroyasu Horiuchi, Kazunari Tamamizu, Sachio Saiki, Masahide Nakamura, Kiyoshi Yasuda:

Deploying service integration agent for personalized smart elderly care. 1-6 - Naoya Nitta:

A formal approach for guiding architecture design with data constraints. 1-6 - Izuru Kume, Masahide Nakamura, Yasuyuki Tanaka, Etsuya Shibayama

:
Evaluation of diagnosis support methods in program debugging by trace analysis: An exploratory study. 1-6
Special Session 6: Learning methods for applications to intelligent data sensing
- Kazushi Okamoto:

Text analysis of academic papers archived in institutional repositories. 1-6 - Kazuhiko Kawamoto, Yoshiyuki Tomura, Kazushi Okamoto:

Learning pedestrian dynamics with kriging. 1-4 - Shinichi Yoshida:

Decoding of emotional visual stimuli using fMRI brain signal. 1-4 - Yutaka Hatakeyama, Hiromi Kataoka, Noriaki Nakajima, Teruaki Watabe, Yoshiyasu Okuhara:

Baseline estimation for serum creatinine for definition of acute kidney injury. 1-4 - Yuusuke Kataoka, Takashi Matsubara

, Kuniaki Uehara:
Image generation using generative adversarial networks and attention mechanism. 1-6 - Ryosuke Tachibana, Takashi Matsubara

, Kuniaki Uehara:
Semi-Supervised learning using adversarial networks. 1-6 - Ryo Akita, Akira Yoshihara, Takashi Matsubara

, Kuniaki Uehara:
Deep learning for stock prediction using numerical and textual information. 1-6 - Yosuke Sakata, Koji Eguchi:

Cross-lingual link prediction using multimodal relational topic models. 1-8
Special Session 7: Theories of Systematic Software Testing
- Tomohiko Takagi, Tatsuki Teramoto:

Extended mutation score based on weighted place/transition nets to evaluate test suites. 1-3 - Shun Akimoto, Shunta Nakanishi, Rihito Yaegashi, Tomohiko Takagi:

Extended differential control flow graphs for the selection of test cases in regression testing. 1-2 - Tomohiko Takagi, Keisuke Noda:

Partially developed coverability graphs for modeling test case execution histories. 1-2 - Liang Xu, Ryosuke Takata, Hiroshi Ohta, Tomohiko Takagi, Norifumi Suehiro, Naka Gotoda, Toshihiro Hayashi, Rihito Yaegashi:

ICT operational models to view the actual usage of teachers' desk systems. 1-3
Special Session 8: Machine learning for speech and language processing
- Yiting Li, Yuki Takashima, Tetsuya Takiguchi, Yasuo Ariki:

Lip reading using a dynamic feature of lip images and convolutional neural networks. 1-6 - Zhaojie Luo

, Tetsuya Takiguchi, Yasuo Ariki:
Emotional voice conversion using deep neural networks with MCC and F0 features. 1-5 - Yuichiro Kataoka, Toru Nakashika, Ryo Aihara, Tetsuya Takiguchi, Yasuo Ariki:

Selection of an optimum random matrix using a genetic algorithm for acoustic feature extraction. 1-6
Special Session 9: Marketing & Management Science with Computational Intelligence
- Shigeaki Tanimoto, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:

Risk assessment quantification of social-media utilization in enterprise. 1-6 - Akiya Inoue, Motoi Iwashita, Kenichi Kitahara:

Behavior analysis on mobile-carrier choice considering Mobile Virtual Network Operators. 1-6 - Arata Koike, Yoshiko Sueda:

Changes in key performance indicators by phase transition in Internet of Things. 1-6 - Motoi Iwashita, Shinichi Kato:

Local revitalization model based on soft systems methodology. 1-6
Special Session 10: Internet of Things for Smart Society
- Yoshitaka Torii, Takanobu Otsuka, Takayuki Ito

:
A diversity sensor connection capability WSN for disaster information gathering system. 1-6 - Tomomichi Hayakawa, Ryo Suzuki, Takayuki Ito

:
Development of River Information Management System according to the participatory sensing. 1-5 - Hao Han, Xiaojun Ma, Keizo Oyama:

Towards detecting and predicting fall events in elderly care using bidirectional electromyographic sensor network. 1-6
Special Session 12: Theory and Applications of Advanced and Intelligent Software
- Masafumi Sato, Koichi Anada

, Masayoshi Tsutsumi:
A mathematical formulation of the "shicho" in the game of Go. 1-6 - Koichi Anada

, Koushi Anzai
, Ken Yokota, Takeo Yaku
:
A multi-layer rectangular dissections and the list structures for the 16-ary grid graph. 1-5 - Toru Fukaya, Tomoyuki Idogawa:

Rational number reconstruction using Chinese remainder theorem on GPU. 1-6
Special Session 13: Affective computing and related machine learning methods
- Xiao Sun

, Xiaoqi Peng, Fuji Ren:
Detect the emotions of the public based on cascade neural network model. 1-6 - Kunxia Wang, ZongBao Zhu, Shidong Wang, Xiao Sun

, Lian Li:
A database for emotional interactions of the elderly. 1-6 - Fei Gao, Xiao Sun

, Kunxia Wang, Fuji Ren:
Chinese micro-blog sentiment analysis based on semantic features and PAD model. 1-5
Special Session 14: Media Communication and Machine Learning Applications
- Zhen Guo, Ying Li, Weihua Xie, Tao Hu:

Network music terminal system design and implementation based on IPTV set-top box. 1-4 - Ying Li, Fei Sha, Shujuan Wang, Tao Hu:

The improvement of page sorting algorithm for music users in Nutch. 1-4 - Tiantian Liu, Zhiyi Fang, Chen Zhao, Yingmin Zhou:

Parallelization of a series of extreme learning machine algorithms based on spark. 1-5 - Liyun Xiang, Zhiyi Fang:

A home-school interaction education platform based on Heterogeneous Data Exchanging. 1-5 - Krishna Prasad Chodey, Gongzhu Hu:

Clinical text analysis using machine learning methods. 1-6 - Yucong Duan, Qiang Duan, Gongzhu Hu, Xiaobing Sun

:
Refinement from service economics planning to ubiquitous services implementation. 1-6
ICS16: The 7th International Workshop on Intelligent Computational Science
- Xiaojun Ren, Sijun Qin, Peng Zang:

The discovery and identification of video page based on topic web crawler. 1-4 - Chi Zhang, Songhong Hong, Pengzhou Zhang:

The research on event extraction of Chinese news based on subject elements. 1-5 - Weichao Chai, Hongbin Dong, Jun He

, Wenqian Shang:
A biogeography-based optimization algorithm with multiple migrations. 1-8 - Yi Huo, Yanfeng Wang, Haihe Hu:

Effective algorithms for video shot and scene boundaries detection. 1-6 - Jia Song, Sijun Qin, Pengzhou Zhang:

Chinese text categorization based on deep belief networks. 1-5 - Jianxiang Cao, Wenqian Shang, Minyong Shi:

The edge-fault tolerant hamiltonian of the balanced hypercube. 1-5 - Jun-Peng Gong, Jia Song:

Research on the performance of segmentation of text classification based on CNICC. 1-3 - Chen Li, Zhengtao Jiang:

A hybrid news recommendation algorithm based on user's browsing path. 1-4 - Mandi Xu, Yuan Liu, Ruimin Lv:

A mosaic style rendering method based on fuzzy color modeling. 1-6 - Fengyan Wu, Shutao Sun, Weiyao Xue:

Automatic extraction of popular music ringtones based on music structure analysis. 1-5 - Jia Song, Xianglin Huang, Sijun Qin, Qing Song:

A bi-directional sampling based on K-means method for imbalance text classification. 1-5 - Xiaomei Guo:

A novel parallel FDTD algorithm on Non-Uniform Memory Access multiprocessors. 1-3 - Taro Nakano, Bhargava Teja Nukala

, Steven Zupancic, Amanda Rodriguez, Donald Y. C. Lie, Jerry Lopez, Tam Q. Nguyen:
Gaits classification of normal vs. patients by wireless gait sensor and Support Vector Machine (SVM) classifier. 1-6 - Mengyi Zhang, Minyong Shi, Zhiguo Hong, Songtao Shang, Menghan Yan:

A TV program recommendation system based on big data. 1-5 - Lu Liu, Zhengtao Jiang:

Research on software reliability evaluation technology based on BP neural network. 1-4 - Zhen Li, Wenjin Wu, Qin Zhang, Hui Ren, Shilei Bai:

Speech enhancement using magnitude and phase spectrum compensation. 1-4 - Cheng Feng, Xiaohong Wang:

Image retrieval system based on bag of view words model. 1-4 - Yuqi Wang, Wenqian Shang, Zhenzhong Li:

The application of factorization machines in user behavior prediction. 1-4 - Lihong Xu, Shutao Sun, Qi Wang:

Text similarity algorithm based on semantic vector space model. 1-4 - Zhenzhong Li, Wenqian Shang, Menghan Yan:

News text classification model based on topic model. 1-5 - Menghan Yan, Wenqian Shang, Zhenzhong Li:

Application of SVD technology in video recommendation system. 1-5 - Menghan Yan, Wenqian Shang, Mengyi Zhang:

The analysis of coordinate-recorded merge-sort based on the divide-and-conquer method. 1-4 - Songtao Shang, Minyong Shi, Wenqian Shang, Zhiguo Hong:

A micro-video recommendation system based on big data. 1-5 - Yuefeng Liu, Minyong Shi, Chunfang Li:

Domain ontology concept extraction method based on text. 1-5 - Zhang He, Minyong Shi, Chunfang Li:

Research and application of path-finding algorithm based on unity 3D. 1-4 - Yi-Lin Guo, Yun Pan, Lei Cai:

OPNET-based analysis of MTU impact on application performance. 1-5 - Lei Cai, Yun Pan, Yi-Lin Guo:

Research on the effects of transport protocols on the application performance based on OPNET. 1-5 - Chunning Wang, Shaochun Xu, Lichao Chen, Xuhui Chen:

Exposing library data with big data technology: A review. 1-6 - Wenlong Fu, Yaguang Wang, Aina Sui, Mengyi Wu:

Research and implementation of knowledge base system for stage art design. 1-6 - Wenlong Fu, Lianjing Jin, Wei Gong, Kemin Wang:

The research of retrieval keyword analysis on stage's design knowledge base. 1-4 - Zhe Zhang

, Huiyan Cheng, Xuhui Chen, Chaolin Ma:
Frequency-specific alterations of functional hub in generalized tonic-clonic seizure. 1-6 - Hongbin Dong, Xue Yang, Xuyang Teng, Yuhai Sha:

A diversity reserved quantum particle swarm optimization algorithm for MMKP. 1-7 - Zhifeng Wu, Yixin Chen:

Link prediction using matrix factorization with bagging. 1-6 - Songsong Zhang, Jing Zhou, Minyong Shi, Chunfang Li:

A simulated login-based SINA microblog data collection method and its data analysis. 1-4 - Min Wang, Yongbin Wang:

SWTUS: A web tag utility and stability metering method. 1-6 - Tong Wang, Liang Wang:

Research on survivability strategic of operating system. 1-5 - Nan Yang, Sanxing Cao, Shufan Zhang:

Data analysis system for online short video comments. 1-6 - Meicong Li, Wei Huang, Yongbin Wang, Wenqing Fan, Jianfang Li:

The study of APT attack stage model. 1-5 - Yufen Cheng, Wenqian Shang, Ligu Zhu, Di Zhang:

Design and implementation of ATM alarm data analysis system. 1-3 - Yufen Cheng, Wenqian Shang, Ligu Zhu, Di Zhang, Dongyu Feng:

Items analysis of postal supervision. 1-3 - Yanwei Lou, Wenqian Shang, Ligu Zhu, Di Zhang, Dongyu Feng:

Visualization research and implementation based on ATM alarm data. 1-4 - Mengke Cheng, Ligu Zhu, Wenqian Shang, Di Zhang, Yuping Han:

Study of the individual english learning and memory based on visualization analysis. 1-5 - Pan Wei, Zhiguo Hong, Minyong Shi:

Performance analysis of HTTP and FTP based on OPNET. 1-4 - Chunqing Li, Kai Liang:

The research of applying multi-scale calculation to simulate concentration difference polarization appeared during MBR membrane separation process. 1-6 - Muzi Sun, Minyong Shi:

A HDRI display algorithm based on image color appearance model. 1-6 - Xinyi Zhou, Wei Gong, Wenlong Fu, Lianjing Jin:

An improved method for LSB based color image steganography combined with cryptography. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














