2017 2nd International Conference on Computer and Communication Systems (ICCCS)

11-14 July 2017

Filter Results

Displaying Results 1 - 25 of 40
  • [Front and back cover]

    Publication Year: 2017, Page(s):c1 - c4
    Request permission for commercial reuse | |PDF file iconPDF (961 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):iii - v
    Request permission for commercial reuse | |PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2017, Page(s):vii - viii
    Request permission for commercial reuse | |PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Source code comprehension analysis in software maintenance

    Publication Year: 2017, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (322 KB) | HTML iconHTML

    Source code comprehension is considered as an essential part of the software maintenance process. It is considered as one of the most critical and time-consuming task during software maintenance process. The difficulties of source code comprehension is analyzed. A static Bottom-up code comprehension model is used. The code is partitioned into functional-based blocks and their data and control depe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular and flexible coordination for web-based applications

    Publication Year: 2017, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (276 KB) | HTML iconHTML

    In this research, I investigate programming-language and middleware abstractions which offer an alternative approach in client/server Web application development, for dealing specifically with coordination between client and server components that has flexibility in mapping components to physical locations. I work on a middleware and JavaScript interpreter that provides support for modular coordin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding symbol algorithm for fast hit rate convergence in slot machine games

    Publication Year: 2017, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (497 KB) | HTML iconHTML

    Slot machines are the most popular facility in casinos worldwide. With the advancement of computer technology, the operating reel spinning of the current slot machine is presented by computer software emulation instead of rotating mechanical iron reels. The reel strip table of a slot machine has many special pictures embedded for different attractive themes. Each slot machine achieves a hit rate b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative study of recent MEA malware phylogeny

    Publication Year: 2017, Page(s):16 - 20
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (289 KB) | HTML iconHTML

    Governments in the MEA did not take cyberwarfare seriously a few years ago. Nowadays, there is a shift to a more concerned posture on the subject of cyber security after a series of public revelations of networks being penetrated around the region. The struggle unpacked by the Stuxnet malware in 2009 and then pursued through Duqu, Flame, Shamoon, Gauss, Duqu2.0, Shamoon 2.0 and Stonedrill malware.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complex project as a knowledge process: Conceptualisations and examples: Applying rethinking project management (RPM) in software-intensive CoPS

    Publication Year: 2017, Page(s):21 - 25
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (347 KB) | HTML iconHTML

    Software (SW) and Information Technology (IT) has frequently used in `Complex Products and Systems' (CoPS) and ways of handling projects. This study has identified three dominant conceptualisations to narrow down the `Rethinking Project Management (RPM)' theory - projects as a knowledge process. Firstly, there is a similar characteristic of managing CoPS and Knowledge-Intensive Firm (KIF), which g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithmic design and implementation of outer-open gomoku

    Publication Year: 2017, Page(s):26 - 30
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (721 KB) | HTML iconHTML

    The Outer-Open Gomoku is a new Gomoku game with three goals: “maintaining connect five”, “simple rule” and “fairness”. This paper introduces the design idea and the implementation of our Outer-Open Gomoku program OOGiveMeFive. It takes advantage of the modern instruction set architecture, inverse bitboard, reducing instruction numbers and search space, etc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Describe the combination of design patterns using a new UML extension technology

    Publication Year: 2017, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (232 KB) | HTML iconHTML

    It is very convenience to use the combination of design patterns as a key participant when on programming. However, in the methods of combination design patterns at present, there are several existing description methods often apply to one or several simple patterns. They are weak in supporting the combination of design patterns and the application tools; In this paper we use a new extension techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A qualitative comparison of popular middleware distributions used in grid computing environment

    Publication Year: 2017, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (556 KB) | HTML iconHTML

    The advancement in the fields of science, engineering, social networking and e-commerce along with the tremendous growth in the pervasive technologies has generated a tsunami of data in digital form. To store and process this type of data is a big challenge for the researcher. Different distributed computing and processing systems have been developed to overcome these real world data computational... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer vision based intruder detection framework (CV-IDF)

    Publication Year: 2017, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (692 KB) | HTML iconHTML

    Surveillance has become a major issue in recent years after food and clothing, the focus is how to prevent sudden attacks to secure our lives. In this paper, we propose a robust algorithm which aims at detecting and tracking multiple intruders in a forbidden area. Significant additions of our paper are that we propose a reliable and efficient framework which uses background subtraction method usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A procedure to build multiword expression data set

    Publication Year: 2017, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (301 KB) | HTML iconHTML

    In this paper, we propose a procedure employing natural language processing methods to build a golden standard multiword expression data set and present our Turkish MWE data set of 3946 positive and 4230 negative candidates that is built following the proposed procedure. The proposed procedure covers three main tasks. The first task is collecting a variety of MWE data resources in order to extract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Cloud Storage Technology Based on FPGA

    Publication Year: 2017, Page(s):50 - 54
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (358 KB) | HTML iconHTML

    The technology uses TCP/IP as the basic means of communication, adding a custom data communication protocol, through the integration of distributed storage scheduling ideas, multiple FPGA development board simulation into a large number of storage devices, through the unified mapping of the target data protocol Processing, to achieve data security, stable and reliable cloud storage, and because th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service-oriented Flexible Network Computing Model

    Publication Year: 2017, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (465 KB) | HTML iconHTML

    The current network architecture is built on a host-centric communication model that is suitable for early network information transmission needs. However, with the emergence and rapid growth of network applications and services, the adaptability, flexibility, scalability and other defects have become increasingly prominent, and the current network architecture can't dynamically provide the requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sigma shift keying (SSK): A paradigm shift in digital modulation techniques

    Publication Year: 2017, Page(s):60 - 64
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (481 KB) | HTML iconHTML

    A new digital modulation technique, named Sigma Shift Keying (SSK), is introduced with minimal transmitter power output (TPO) and very low probability of intercept (POI). Standard deviations (or variances, respectively) of zero mean Gaussian noise signals are being digitally modulated instead of shift keying of sinusoidal carrier signals. Following a theoretical analysis of achievable bit error ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Named data networking testbed for scientific data

    Publication Year: 2017, Page(s):65 - 69
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (500 KB) | HTML iconHTML

    Named Data Networking (NDN) is one of the future internet architectures, which is a clean-slate approach. NDN provides intelligent data retrieval using the principles of name-based symmetrical forwarding of Interest/Data packets and innetwork caching. The continually increasing demand for rapid dissemination of large-scale scientific data is driving the use of NDN in data-intensive science experim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time scheduling for power-saving of mixed tasks with periodic and aperiodic

    Publication Year: 2017, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (291 KB) | HTML iconHTML

    We propose power-saving real-time scheduling method for mixed task sets which consist of both time-based periodic and event-based aperiodic tasks in the automotive operating system. In order to consider power saving, it is necessary to estimate the slack time and minimize the response time of the aperiodic task simultaneously. However, because these two goals conflict with each other, It must comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing of customer and employee churn prediction model based on data mining method and neural predictor

    Publication Year: 2017, Page(s):74 - 77
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (257 KB) | HTML iconHTML

    In recent years due to increased competition between companies in the services sector, predict churn customer in order to retain customers is so important. The impact of brand loyalty and customer churn in an organization as well as the difficulty of attracting a new customer per lost customer is very painful for organizations. Obtaining a predictive model customer behaviour to plan for and deal w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the efficiency of dense stereovision algorithm implementation on different computer architectures

    Publication Year: 2017, Page(s):78 - 81
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (329 KB) | HTML iconHTML

    Algorithms of dense stereovision can be of great interest for designing computer vision systems of autonomous mobile objects. In the process of computing dense stereo, on the one hand, a lot of arithmetic operations are performed and a significant memory resource is required, and, on the other hand, the majority of dense stereovision algorithms can be parallelized. Different modern computer archit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fusion of color and infrared images using gradient transfer and total variation minimization

    Publication Year: 2017, Page(s):82 - 85
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (295 KB) | HTML iconHTML

    The objective of this paper is to propose an algorithm for fusion of images of two different image modalities, i.e., color visual image and its corresponding infrared (IR) image. Fusion method is based on l1 total variation minimization technique, and it combines appearance detail and thermal information for a scene using visual and IR images, respectively. Moreover, the proposed method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noise estimation for denoising multi-frame color images

    Publication Year: 2017, Page(s):86 - 90
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (630 KB) | HTML iconHTML

    This paper proposes and analyzes the performance of noise estimation technique for multi-frame noisy images. The proposed method is then applied to denoise multi-frame color image that contain different level of image contents or activity levels. The evaluation results have shown that, for the image with high level of activity, i.e., the one with large high frequency components, our technique outp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.