Автор: Shahram Latifi
Издательство: Springer International Publishing
Год: 2018
ISBN: 9783319770277
Серия: Advances in Intelligent Systems and Computing (Book 738)
Формат: pdf
Страниц: XVII, 818
Размер: 35,5 mb
Язык: English
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology – New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education.
Part I Cybersecurity
1 Safeguarding Personal Health Information: Case Study
Holly Gandarilla
2 Cybersecurity as People Powered Perpetual Innovation
Mansur Hasib
3 Performance Study of the Impact of Security on 802.1 lac Networks
Anthony Tsetse, Emilien Bonniord, Patrick Appiah-Kubi, and Samuel Tweneboah-Kodua
4 Training Neural Tensor Networks with the Never Ending Language Learner
Flavio A. O. Santos, Filipe B. do Nascimento, Matheus S. Santos, and Hendrik T. Macedo
5 PERIA-Framework: A Prediction Extension Revision Image Annotation Framework
Umer Rashid and Bakhtawar Arif
6 The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan
Askar Boranbayev, Seilkhan Boranbayev, Assel Nurusheva. and Kuanysh Yersakhanov
7 Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network
Michael Gibbs
8 A Virtual Animated Commentator Architecture for Cybersecurity Competitions
Ruth Agada, Jie Yan, and Weifeng Xu
9 Malicious Software Classification Using VGG16 Deep Neural Network’s Bottleneck Features
Edmar Rezende, Guilherme Ruppert, Tiago Carvalho, Antonio Theophilo, Fabio Ramos, and Paulo de Geus
10 Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach)
Hossein Zare. Mohammad Jalal Zare, and Mojgan Azadi
11 A Self Proxy Signature Scheme Over NTRU Lattices
Sonika Singh and Sahadeo Padhye
12 Towards an Ontology of Security Assessment: A Core Model Proposal.....
Ferrucio de Franco Rosa, Mario Jino, and Rodrigo Bonacin
13 Integration of Mobile Forensic Tool Capabilities
Ping Wang, Matt Rosenberg, and Hubert D’Cruze
14 Deep Packet Inspection: A Key Issue for Network Security
Hannah Bartus
15 What Pctya/Not Petya Ransom ware Is and What Its Rcmidiations Are
Sharifah Yaqoub A. Fayi
16 Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform
Anteneh Girina
17 New Techniques for Public Key Encry ption w ith Sender Recovery
Murali Godi and Roopa Vishwanathan
18 Cloud Intrusion Detection and Prevention System for M-Voting Application in South Africa: Suricata vs. Snort
Moloiyatsana Dina Moloja
19 Protecting Personal Data with Blockchain Technology
Alexander Masluk and Mikhail Gofman
20 The Role of CAE-CDE in Cybersecurity Education for Workforce Development
Maurice Dawson, Ping Wang, and Kenneth Williams
21 Software Optimizations for DES
Shay Gueron and Regev Shemy
Part II Networking and Wireless Communications
22 Design and Development of VXLAN Based Cloud Overlay Network Monitoring System and Environment
Shahzada Khurram and Osman Ghazali
23 End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks
Vicente Casares-Giner, Tatiana Ines Navas, Dolly Smith Florez, and Tito R. Vargas H.
24 Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges
Heleno Cardoso da Silva Filho, Glauco de Figueiredo Cameiro, Ed Santana Martins Costa, andMiguel Monteiro
25 A Dual Canister Medicine IoT Dispenser
Peter James Vial, James Sansom, David Stirling, Prashan Premaratne, Le Chung Tran, and Montserrat Ros
26 Local Clock Synchronization Without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks
Ayako Arao and Hiroaki Higaki
27 Denial of Service Attacks in Wireless Sensor Networks w ith Proposed Countermeasures
Ademola Philip Abidoye and Elisha Oketch Ochola
Part III Education and Technology
28 Internet-Based Education: A New Milestone for Formal Language and Automata Courses
Joao E. M. Rocha. Celso Olivete, Pedro H. A. Gomes, Rogerio E. Garcia, Ronaldo С. M. Correia, Gabriel Spadon de Souza, and Danilo M. Eler
29 Teaching Communication Management in Software Projects Through Serious Educational Games
Rafaella Marchi Pellegrini, Carlos Eduardo Sanches da Silva, and Adler Diniz de Souza
30 Gamification Applied in the Teaching of Agile Scrum Methodology
Luiz Eduardo Guarino de Vasconcelos, Leonardo B. Oliveira, Gabriel Guimaraes, and Felipe Ayres
31 An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework
Adler Diniz de Souza, Rodrigo Duarte Seabra, Juliano Marinho Ribeiro, and Lucas Eduardo da Silva Rodrigues
Part IV Agile Software Testing and Development
32 Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects
Laurie Butgereit
33 Alignment of Requirements and Testing in Agile: An Industrial Experience
Alessio Bucaioni. Antonio Cicchetti. Federico Ciccozzi, Manvisha Kodali, and Mikael Sjodin
34 Health Care Information Systems: A Crisis Approach
Daniela America da Silva, Gildarcio Sousa Goncalves, Samara Cardoso dos Santos, Victor Ulisses Pugliese, Julhio Navas, Rodrigo Monteiro de Barros Santana, Filipe Santiago Queiroz, Luiz Alberto Vieira Dias, Adilson Marques da Cunha, and Paulo Marcelo Tasinaffo
35 Using Correct-by-Const ruction Software Agile Development
Rafael Augusto Lopes Shigemura, Gildarcio Sousa Goncalves, Luiz Alberto Vieira Dias, Paulo Marcelo Tasinaffo. Adilson Marques da Cunha. Luciana Sayuri Mizioka, Leticia Hissae Yanaguya, and Victor Ulisses Pugliese
36 Service-Centered Operation Methodology (MOCA) Application Supported by Computer Science to Improve Continuously Care Quality in Public Services
Denis Avila Montini, Gustavo Ravanhani Matuck, Danilo Douradinho Fernandes, Alessandra Avila Montini, Fernando Graton, Plinio Ripari, and Flavia de Sousa Pinto
37 Improving Agile Software Development with Domain Ontologies
Pedro Lopes de Souza, Antonio Francisco do Prado. Wanderley Lopes de Souza, Sissi Marilia dos Santos Forghieri Pereira, and Luis Ferreira Pires
38 A Stratified Sampling Algorithm for Artificial Neural Networks
Danilo Douradinho Fernandes, Gustavo Ravanhani Matuck, Denis Avila Montini, Luiz Alberto Vieira Dias, and Alessandra Avila Montini
Part V Data Mining/Machine Learning
39 Mining ENADE Data from the Ulbra Network Institution
Heloise Acco Tives Leao, Edna Dias Canedo, Marcelo Ladeira, and Fabiano Fagundes
40 Fault Diagnostic of Variance Shifts in Clinical Monitoring Using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)
Nadeera Gnan Tilshan Gunaratne, Mali Abdollahian, and Shamsul Huda
41 Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise
Strauss Carvalho Cunha. Emanuel Mineda Cameiro, Lineu Fernando Stege Mialaret, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha
42 Cross-Language Approach for Sentiment Classification in Brazilian Portuguese with ConvNets
Rafael P. da Silva, Flavio A. O. Santos, Filipe B. do Nascimento, and Hendrik T. Macedo
43 Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and Their Meaning in Satellite Image Time Series
C. R. Silveira Jr., J. R. Cecatto, M. T. P. Santos, and M. X. Ribeiro
44 DcRis: Information System Supporting the Prediction of Default Risk in Companies
Claudio Augusto Silveira Lelis, and Andre Luiz Silveira Lopardi
45 Taking a Steppe Towards Optimizing Note-Taking Software by Creation of a Note Classification Algorithm
Daniela Zieba. Wren Jenkins, Michael Galloway, and Jean-Luc Houle
46 Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics
Pedro Fernandes, Alexandre С. B. Ramos, Danilo Pereira Roque, and Marcelo Santiago de Sousa
47 A Model for Hour-Wise Prediction of Mobile Device Energy Availability
Mathias Longo, Cristian Mateos, and Alejandro Zunino
48 Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model
Nuwee Wiwatwattana, Sirikarn Chareonnivassakul, Noppon Maleerutmongkol, and Chavin Charoenvitvorakul
49 A Traffic Light Recognition Device
Thiago Almeida, Hendrik Macedo, and Leonardo Matos
50 An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment
Ronaldo de Matos Nascimento Filho, Glauco de Figueiredo Cameiro and Miguel Monteiro
51 Reproducible Research in Document Analysis and Recognition
Jorge Ramon Fonseca Cacho and Kazem Taghva
52 Music Genre Classification Using Data Mining and Machine Learning
Nimesh Ramesh Prabhu, James Andro-Vasko, Doina Bein, and Wolfgang Bein
53 Improving Word Representations Using Paraphrase Dataset
Flavio Arthur O. Santos and Hendrik T. Macedo
54 A Initial Experimental К valuation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interaetions
Breno Santana Santos, Methanias Cola^o Junior, and Janisson Gois de Souza
55 Dual Long Short-Term Memory Networks for Sub-Character Representation beaming
Han He, Lei Wu. Xiaokun Yang. Hua Yan Zhimin Gao, Yi Feng, and George Townsend
56 Business Intelligence Dashboard Application for Insurance Cross Selling
Jagan Mohan Narra, Doina Bein. and Vlad Popa
57 Speech Features Analysis for Tone Language Speaker Discrimination Systems
Mercy Edoho, Moses Ekpenyong, and Udoinyang Inyang
58 Selection of Transformations of Continuous Predictors in Logistic Regression
Michael Chang, Rohan J. Dalpatadu. and Ashok K. Singh
Part VI Software Engineering
59 A Generic Approach to Efficiently Parallelize Legacy Sequential Software
Andreas Granholm and Federico Ciccozzi
60 Clustering and Combinatorial Methods for Test Suite Prioritization of Gl'I and Web Applications
Dmitry' Nurmuradov. Renee Bryce, Shraddha Piparia, and Barrett Bryant
61 A Timed Petri Net Model to Specify Scenarios of Video Games
Franciny M. Barreto. Joslaine Cristina Jeske de Freitas, and Stephane Julia
62 Survey of Biometric Techniques for Automotive Applications
Maria Villa. Mikhail Gofman. and Sinjini Mitra
63 A Survey on Adoption Good Practices for ICT Governance at Enhanced Organizations
Marianne Batista Diniz da Silva, Alef Menezes dos Santos, Michel dos Santos Soares, Rogerio Patricio Chagas do Nascimento. and Isabel Dillmann Nunes
64 Budget and User Eeedback Control Strategy-Based PRMS Scenario Web Application
Rui Wu. Jose Painumkal, Sergiu M. Dascalu, and Frederick C. Harris Jr.
65 A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules
Carlos Eugenio P da Purifica^oand Paulo Caetano da Silva
66 An Approach Based on Possibilistic WorkElow Nets to Model Multiplayer Video Games
Franciny M. Barreto, Leiliane Pereira de Rezende. and Stephane Julia
67 A Requirements Engineering-Based Approach for Evaluating Security Requirements Engineering Methodologies
Sravani Teja Bulusu. Romain Laborde. Ahmad Samer Wazan, Francois Barrere, and Abdelmalek Benzekri
68 Increasing the Prediction Quality of Software Defective Modules with Automatic Feature Engineering
Alexandre Moreira Nascimento, Vinfcius Veloso de Melo, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha
Part VII High Performance Computing Architectures
69 NSF Noyce Recruitment and Mentorship
Fangyang Shen, Janine Roccosalvo, Jun Zhang, Yanqing Ji, Yang Yi, and Lieselle Trinidad
70 Mining Associations Between Two Categories Using Unstructured Text Data in Cloud
Yanqing Ji, Yun Tian, Fangyang Shen. and John Tran
71 A Note on Computational Science Curriculum
Jun Zhang and Fangyang Shen
72 Development of a Local Cloud-Based Bioinformatics Architecture
Chandler Staggs and Michael Galloway
Part VIII Computer Vision, Image Processing/Analysis
73 A Computer Vision Based Algorithm for Obstacle Avoidance
Wander Mendes Martins, Rafael Gomes Braga, Alexandre Carlos Brandao Ramos, and Felix Mora-Camino
74 The ST-Vis Tool for SpatioTemporal Visualization
Ana Paula S. Braatz Vieira. Rafael S. Joao, Luciana A. S. Romani, and Marcela X. Ribeiro
75 Detection of Early Gastric Cancer from Endoscopic Images Using Wavelet Transform Modulus Maxima
Yuya Tanaka and Teruya Minamoto
76 Detection Method of Early Esophageal Cancer from Endoscopic Image Using Dyadic Wavelet Transform and Four-Layer Neural Network
Hajime Omura and Teruya Minamoto
77 Study of Specific Location of Exhaustive Matching in Order to Improve the Optical EIow Estimation
Vanel Lazcano
78 Solar-Powered UAV Platform System: A Case Study for Ground Change Detection in BRIC Countries
Alexandre С. B. Ramos, Elcio H. Shiguemori, Sergey Serokhvostov, P. K. Gupta, Lunlong Zhong, and Xiao Bing Hu
Part IX Health. Bioinforniatics, Pattern Detection and Optimization
79 Benefits of Establishing Makers paces in Distributed Development Environment
Basit Shahzad and Kashif Saleem
80 Semantic Description of Healthcare Devices to Enable Data Integration
Antonella Carbonaro, Filippo Piccinini. and Roberto Reda
81 Applying Transfer Learning to QSAR Regression Models
Rodolfo S. Simoes, Patricia R. Oliveira, Kathia M. Honorio, and Clodoaldo A. M. Lima
82 Investigating the Recognition of Non-articulatory Sounds by Using Statistical Tests and Support Vector Machine
Francisco Carlos M. Souza, Alinne C. Correa Souza, Gilberto M. Nakamura, M. D. Soares, Patricia Pupin Mandra. and Alessandra A. Macedo
83 A Complete Diabetes Management and Care System
Claudio Augusto Silveira Lelis and Renan Motta
84 On the Use of van der Pauw Technique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IEC) with Extension to Other E-Stim Monitoring
Lawrence V. Hmurcik. Sarosh Patel, and Navarun Gupta
Part X Potpourri
85 Smart Lighting Controlling System: Case Study of Yarmouk University Museum
Mohammed Akour, Ziad AI Saad, Abd Rahman A1 Asmar, and Abd A1 Rahem Jar rah
86 Incremental Topology Generated for ANN: A Case Study on a Helicopter’s Flight Simulation
Pedro Fernandes, Jr., Alexandre С. B. Ramos, Danilo Pereira Roque, and Marcelo Santiago de Sousa
87 Degree Aware Triangulation of Annular Regions
Laxmi P. Gewali and Bhaikaji Gurung
88 Heuristic Approaches for the Open-Shop Scheduling Problem
Wissam Marrouche and Haidar M. Harmanani
8‘J Continuous State Power-Down Systems for Renewable Energy Management
James Andro-Vasko, Surya Ravali Avasarala, and Wolfgang Bein
90 Extracting Timing Models from Component-Based Multi-Criticality Vehicular Embedded Systems
Saad Mubeen, Mattias Galnander, John Lundback, and Kurt-Lennart Lundback
Part XI Short Papers
91 BIG IoT: Interconnecting IoT Platforms from Different Domains—First Success Story
Thomas Jell, Claudia Baumgartner, Ame Broring, and Jelena Mitic
92 Cross-Cultural Perspective of E-Commerce Website Usability Requirements: Through the Lens of Individual's Perception
Jay Jung, Jae Min Jung, and Sonya Zhang
93 Methods of Ensuring the Reliability and Fault Tolerance of Information Systems
Askar Boranbayev, Seilkhan Boranbayev, Kuanysh Yersakhanov, Assel Nurusheva. and Roman Taberkhan
94 Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise
Strauss Carvalho Cunha. Emanuel Mineda Cameiro, Lineu Fernando Stege Mialaret, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha
95 Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly
J. L. C. Mello, D. M. T. Souza, С. M. Tamaki, V. A. C. Galhardo, D. F. Veiga, and A. С. B. Ramos
96 A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company
Strauss Carvalho Cunha. Emanuel Mineda Cameiro, Lineu Fernando Stege Mialaret, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha
97 Confidentiality, Integrity and Availability in Electronic Health Records: An Integrative Review
Mojgan Azadi. Hossein Zare, and Mohammad Jalal Zare
98 Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus)
Hossein Zare, Peter Olsen, Mohammad Jalal Zare, and Mojgan Azadi
99 Method of Processing Big Data
Seilkhan Boranbayev, Assulan Nurkas, Yersultan Tulebayev, and Baktygeldi Tashtai
100 Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan
Askar Boranbayev, Ruslan Baidyussenov, and Mikhail Mazhitov
101 Modified Huffman Code for Bandwidth Optimization Through Lossless Compression
Alexander Hansen and Mark C. Lewis
Author Index