Search Results - "2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation"

Refine Results
  1. 1

    Location-Based Services with iBeacon Technology by Kohne, Markus, Sieck, Jurgen

    “…iBeacons are a new way to interact with hardware. An iBeacon is a Bluetooth Low Energy device that only sends a signal in a specific format. They are like a…”
    Get full text
    Conference Proceeding
  2. 2

    [Keynote Speaker-1] Feature Selection in Data-Driven Systems Modelling by Shen, Qiang

    “…Summary form only given, as follows. Feature selection (FS) addresses the problem of selecting those system descriptors that are most predictive of a given…”
    Get full text
    Conference Proceeding
  3. 3

    Simulating a Multi-core x8664 Architecture with Hardware ISA Extension Supporting a Data-Flow Execution Model by Nam Ho, Portero, Antoni, Solinas, Marcos, Scionti, Alberto, Mondelli, Andrea, Faraboschi, Paolo, Giorgi, Roberto

    “…The trend to develop increasingly more intelligent systems leads directly to a considerable demand for more and more computational power. Programming models…”
    Get full text
    Conference Proceeding
  4. 4

    [Keynote Speaker-2] Challenges in Handling and Processing Huge Data by Hessling, Hermann

    “…Summary form only given, as follows. Data-intensive computing is considered as the fourth paradigm in science. The term “data-intensive computing” did not…”
    Get full text
    Conference Proceeding
  5. 5

    Attack Prediction Models for Cloud Intrusion Detection Systems by Kholidy, Hisham A., Erradi, Abdelkarim, Abdelwahed, Sherif

    “…In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security…”
    Get full text
    Conference Proceeding
  6. 6

    System Failure Prediction through Rare-Events Elastic-Net Logistic Regression by Navarro, Jose M., Parada, G. Hugo A., Duenas, Juan C.

    “…Predicting failures in a distributed system based on previous events through logistic regression is a standard approach in literature. This technique is not…”
    Get full text
    Conference Proceeding
  7. 7

    Feature Based Encryption Technique for Securing Forensic Biometric Image Data Using AES and Visual Cryptography by Kester, Quist-Aphetsi, Nana, Laurent, Pascu, Anca Christine, Gire, Sophie, Eghan, J. M., Quaynor, Nii Narku

    “…With the current emergence of biometric image data applications on devices such as smart phones, security cameras, personal computers etc, there is a need for…”
    Get full text
    Conference Proceeding
  8. 8

    Exploring Experts Decisions in Concrete Delivery Dispatching Systems Using Bayesian Network Learning Techniques by Maghrebi, Mojtaba, Waller, S. Travis

    “…Optimally solving large scale Ready Mixed Concrete Dispatching Problems (RMCDPs) in polynomial time is a crucial issue and, in the absence of automated…”
    Get full text
    Conference Proceeding
  9. 9

    A Modeling Approach for IT Governance Basics Application on IT Projects and IT Goals by El Ghorfi, Rabii, Ouadou, Mohamed, Aboutajdine, Driss, El Aroussi, Mohamed

    “…IT governance meets the need of decision making and leads to settling the main preoccupations company leaders have. It aims at developing good practice through…”
    Get full text
    Conference Proceeding
  10. 10

    "Smart Ships": Mobile Applications, Cloud and Bigdata on Marine Traffic for Increased Safety and Optimized Costs Operations by Garcia Dominguez, Alejandro

    “…The increasing maritime traffic, due to worldwide trade, tends to increase the risk of wrecks, collisions and contacts between ships, producing sinking with…”
    Get full text
    Conference Proceeding
  11. 11

    Eye-Gaze Tracking Method Driven by Raspberry PI Applicable in Automotive Traffic Safety by Stan, Ovidiu, Miclea, Liviu, Centea, Ana

    “…This paper comes as a response to the fact that, lately, more and more accidents are caused by people who fall asleep at the wheel. Eye tracking is one of the…”
    Get full text
    Conference Proceeding
  12. 12

    A Semi-Supervised Multi-view Genetic Algorithm by Lazarova, Gergana, Koychev, Ivan

    “…Semi-supervised learning combines labeled and unlabeled examples in order to find better future predictions. Usually, in this area of research we have massive…”
    Get full text
    Conference Proceeding
  13. 13

    Detecting and Minimizing Bad Posture Using Postuino among Engineering Students by Alattas, Reem, Elleithy, Khaled

    “…To understand how good posture minimizes computer related injury's pain, we developed Postuino. A device that warns the computer users if they are leaning too…”
    Get full text
    Conference Proceeding
  14. 14

    Synergetic Control of a Mobile Robot Group by Veselov, Gennady, Sklyrov, Andrey, Mushenko, Alexey, Sklyrov, Sergey

    “…We explore the problem of synergetic control law design for a group of mobile robots. To solve this problem we present the new approach to control of a group…”
    Get full text
    Conference Proceeding
  15. 15

    An Approach to Represent Time Series Forecasting via Fuzzy Numbers by Sahin, Atakan, Kumbasar, Tufan, Yesil, Engin, Doydurka, M. Furkan, Karasakal, Onur

    “…This paper introduces a new approach for estimating the uncertainty in the forecast through the construction of Triangular Fuzzy Numbers (TFNs). The interval…”
    Get full text
    Conference Proceeding
  16. 16

    Using Ontology for Providing Content Recommendation Based on Learning Styles inside E-learning by Kusumawardani, Sri Suning, Prakoso, Robertus Sonny, Santosa, Paulus Insap

    “…E-Learning as one of the learning support facilities provides various content types and interaction models inside. This wide range of content types inside…”
    Get full text
    Conference Proceeding
  17. 17

    Prevention of Wormhole Attacks in Wireless Sensor Networks by Aldhobaiban, Dema, Elleithy, Khaled, Almazaydeh, Laiali

    “…Security of deployed wireless sensor networks (WSNs) has become a crucial task as the deployment of WSN'S grows. This paper proposes a novel way and develops a…”
    Get full text
    Conference Proceeding
  18. 18

    A Comparative Analysis on Home Automation Techniques by Baig, Mirza Qutab, Maqsood, Junaid, Haris Bin Tariq Alvi, Muhammad, Khan, Tamim Ahmed

    “…Smart homes have emerged as an area of research interest in recent years. Home automation offers us independence and complete control over your home along with…”
    Get full text
    Conference Proceeding
  19. 19

    Analysis of VoIP over LTE End-to-End Performances in Congested Scenarios by Vizzarri, Alessandro

    “…Long Term Evolution (LTE) is the first fully IPbased 3GPP standard for wireless transmission system. Due to innovative features it is able to offer very high…”
    Get full text
    Conference Proceeding
  20. 20

    Design and Comparison of Feasible Control Systems for VSC-HVDC Transmission System by Boyang Shen, Sheng Wang, Lin Fu, Jun Liang

    “…This Paper presents the modeling and control of two-terminal Voltage Source Converter Based High Voltage Direct Current (VSC-HVDC) transmission system which…”
    Get full text
    Conference Proceeding