Search Results - "2017 17th International Conference on Computational Science and Its Applications (ICCSA)"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Machine Learning and IoT for prediction and detection of stress by Pandey, Purnendu Shekhar

    “…According to a cardiac surgeon, it is difficult to predict age from heart rate as it is nonlinear, but we can use a person's heart beat to predict whether that…”
    Get full text
    Conference Proceeding
  2. 2

    The role of information and innovative technology for rehabilitation of children with Autism: A Systematic Literature Review by Shoaib, Muhammad, Hussain, Ibrar, Mirza, Hamid Turab, Tayyab, Muhammad

    “…This paper presents a literature review of roles played by information and innovative technologies for helping children suffering from Autism Spectrum Disease…”
    Get full text
    Conference Proceeding
  3. 3

    Information retrieval based feature analysis for product line adoption in 4GL systems by Kicsi, Andras, Vidacs, Laszlo, Beszedes, Arpad, Kocsis, Ferenc, Kovacs, Istvan

    “…New customers often require custom features of a successfully marketed product. As the number of variants grow, new challenges arise in the maintenance and…”
    Get full text
    Conference Proceeding
  4. 4

    An approach to align business and IT perspectives during the SOA services identification by Souza, Eric, Moreira, Ana, De Faveri, Cristiano

    “…Service-oriented architectures are a widely used business practice to develop enterprise information systems. However, the current analysis and design methods…”
    Get full text
    Conference Proceeding
  5. 5

    Evaluation of Real Time Location System technologies in the health care sector by Pancham, J., Millham, Richard, Fong, Simon James

    “…This concept paper reviews relevant literature in order first to identify the most common features needed for an effective health care Real Time Location…”
    Get full text
    Conference Proceeding
  6. 6

    A way for creating and using a theory of a project in designing of a software intensive system by Sosnin, P.

    “…The extremely low degree of success in designing the systems with software is a root reason for the finding of novelties in theoretical and practical…”
    Get full text
    Conference Proceeding
  7. 7

    Test case generation from BPMN models for automated testing of Web-based BPM applications by Lasch de Moura, Jessica, Schwertner Charao, Andrea, Lima, Joao Carlos Damasceno, de Oliveira Stein, Benhur

    “…This article proposes an approach to generate test cases from BPMN models, for automated testing of Web applications implemented with the support of BPM…”
    Get full text
    Conference Proceeding
  8. 8

    Evaluation of the shared-memory parallel Fast Marching Method for re-distancing problems by Diamantopoulos, Georgios, Weinbub, Josef, Hossinger, Andreas, Selberherr, Siegfried

    “…The Fast Marching Method is widely used for the solution of the Eikonal equation in problems arising in science and engineering applications. A common…”
    Get full text
    Conference Proceeding
  9. 9

    Modeling and analysis of the signaling crosstalk of PI3K, AMPK and MAPK with Timed Hybrid Petri Nets approach by Bibi, Zurah, Ahmad, Jamil, Paracha, Rehan Zafar, Siddiqa, Amnah

    “…In living organisms, cellular functions are executed and controlled by gene regulatory networks. Malfunctioning of controlled regulation can lead to…”
    Get full text
    Conference Proceeding
  10. 10

    Input and output artefacts in portfolio practices from the OGC standard for Management of Portfolios by Lima, Ana, Machado, Ricardo J., Fernandes, Gabriela

    “…There is a new economic paradigm that establishes the need for continuous updating, concern with customer satisfaction and the generation of products and…”
    Get full text
    Conference Proceeding
  11. 11

    Deception planning models for cyber security by De Faveri, Cristiano, Moreira, Ana, Souza, Eric

    “…Deception-based mechanisms are typically used to enhance overall security by causing misperception on adversaries who take actions in favor of defense. The…”
    Get full text
    Conference Proceeding
  12. 12

    Improve performance of machine translation service using memcached by Gupta, Priyank, Ahmad, Rashid, Shrivastava, Manish, Kumar, Pawan, Sinha, Mukul K.

    “…Sampark is machine translation system providing translations among nine pairs of Indian languages. Machine translation system is a class of natural language…”
    Get full text
    Conference Proceeding
  13. 13

    Comparing three simple ways of generating neighboring solutions when solving the cell formation problem using two versions of migrating birds optimization by Almonacid, Boris, Soto, Ricardo, Crawford, Broderick

    “…The cell formation problem is a classic optimization problem devoted to the manufacturing industry. Such a problem proposes to divide a manufacturing plant in…”
    Get full text
    Conference Proceeding
  14. 14

    IdenEH: Identify error-handling code snippets in large-scale software by Jinyu Liu, Shanshan Li, Zhouyang Jia, Xiaodong Liu, Bin Lin, Xiangke Liao

    “…Error-handling (EH) code snippets are widely used for troubleshooting in software projects. Analyzing these snippets help to better understand how developers…”
    Get full text
    Conference Proceeding
  15. 15

    Applications of phase type survival trees in HIV disease progression modelling by Gafa, Marija, Garg, Lalit, Masala, Giovanni, McClean, Sally I.

    “…It is important to model progression of a disease to understanding if the patient's condition is improving or getting worse. In the case of HIV disease, the…”
    Get full text
    Conference Proceeding
  16. 16

    An empirical investigation of knowledge management in Vietnamese SMEs by Quoc Trung Pham, Duy Thai Nguyen

    “…Knowledge management (KM) is a discipline that improves the ability of companies in solving problem, adapt with changing in business, also helping them to gain…”
    Get full text
    Conference Proceeding
  17. 17

    Social Media spatial monitor of Coup Attempt in the Republic of Turkey by Gulnerman, Ayse Giz, Karaman, Himmet

    “…Social Media is a wide, continuous and unstructured data source that produced by unconscious volunteers especially for geographic information. This easily…”
    Get full text
    Conference Proceeding