Volume 4, Number 2, 2014
Fourth International conference on Computer Science & Information Technology (CCSIT 2014), February 21~22, 2014, Sydney, Australia.
Volume Editors: David C. Wyld, Natarajan Meghanathan, Dhinaharan Nagamalai
ISBN: 978-1-921987-27-4 Download full Proceedings
ECSM: Energy Efficient Clustering Scheme for Mobile M2M Communication Networks
Mohammed Saeed Al-kahtani, Salman bin Abdulaziz University, Saudi Arabia
Mining Developer Communication Data Streams
Andy M. Connor, Jacqui Finlay and Russel Pears, Auckland University of Technology, New Zealand
A Distributed Agent Media Access Framework
Craig M. Gelowitz, Luigi Benedicenti and Raman Paranjape, University of Regina, Canada
Multilevel Techniques for the Clustering Problem
Noureddine Bouhmala, Vestfold University College, Norway
Multi-Dimensional Customization Modelling Based on Metagraph for SAAS Multi-Tenant Applications
Ashraf A. Shahin, Al Imam Mohammad Ibn Saud Islamic University, Kingdom of Saudi Arabia
Effect of Colours in Manual Data Typing
Melih Kirlidog, Marmara University, Turkey
Backtracking Based Integer Factorisation, Primality Testing and Square Root Calculation
Mohammed Golam Kaosar, Charles Sturt University, Australia
Human Interaction in the Regulatory of Telecommunications Infrastructure Deployment in South Africa
Sharol Sibongile Mkhomazi1 and Tiko Iyamu2, 1Tshwane University of Technology, South Africa and 2Polytechnic of Namibia, Namibia
Parameter Space and Comparative Analyses of Energy Aware Sensor Communication Protocols
Ittipong Khemapech, University of the Thai Chamber of Commerce, Thailand
A Method to Identify Potential Ambiguous Malay Words Through Ambiguity Attributes Mapping: An Exploratory Study
Hazlina Haron1,2 and Abdul Azim Abd. Ghani1, 1Universiti Putra Malaysia, Malaysia and 2Universiti Utara Malaysia, Malaysia
Towards A Semantic for UML Activity Diagram Based on Institution Theory for it's Transformation to Event-B Model
Aymen Achouri, University of Tunis, Tunisia
An Explicit Trust Model Towards Better System Security
Orhio Mark Creado1, Bala Srinivasan1, Phu Dung Le1 and Jefferson Tan2, 1Monash University, Australia and 2IBM Research - Australia
Energy Efficient Load Balanced Routing Protocol for Wireless Sensor Networks
Alghanmi Ali Omar and ChongGun Kim, Yeungnam University, South Korea
User Preferred Color Combination Design Using Interactive Genetic Algorithm
Tad Gonsalves and Ayumi Kawai, Sophia University, Japan
Process-Driven Software Development Methodology for Enterprise Information System
Kwan Hee Han1 and Yongsun Choi2, 1Gyeongsang National University, Korea and 2Inje University, Korea
Development and Evaluation of a Web Based Question Answering System for Arabic Language
Heba Kurdi, Sara Alkhaider and Nada Alfaifi, Al Imam Muhammad Ibn Saud Islamic University, Saudi Arabia
Coherence Enhancement Diffusion Using Robust Orientation Estimation
Mohammad A. U. Khan1, Tariq M. Khan2, Wadee Al-Halabi3, Hiba Shahid1 and Yinan Kong2, 1Effat University, Saudi Arabia, 2Macquarie University, Australia and 3Abdulaziz University, Saudi Arabia
A Fast PU Mode Decision Algorithm for H.264/AVC to HEVC Transcoding
Jiunn-Tsair Fang1, Zong-Yi Chen2, Tsai-Ling Liao2 and Pao-Chi Chang2, 1Ming Chuan University, Taiwan and 2National Central University, Taiwan
Off-Line System for the Recognition of Handwritten Arabic Character
Ahmed Sahloul1 and Cheng Suen2, 1Damietta University, Egypt and 2Concordia University, Canada
A Novel Global Threshold-Based Active Contour Model
Nuseiba M. Altarawneh1, SuhuaiLuo1, Brian Regan1, ChangmingSun2, 1The University of Newcastle, Australia and 2CSIRO Computational Informatics, Australia
Automatic Estimation of Live Coffee Leaf Infection Based on Image Processing Techniques
Eric Hitimana and Oubong Gwun, Chonbuk National University, South Korea
DAC for High Speed and Low Power Applications Using Abacus
Shankarayya G. Kambalimath, Basaveshwar Engineering College, India
Visual Saliency Model Using Sift and Comparison of Learning Approaches
Hamdi Yalin Yalic, Hacettepe University, Turkey
Violent Scenes Detection Using Mid-Level Violence Clustering
Shinichi Goto and Terumasa Aoki, Tohoku University, Japan
Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Mammographic Images
Pradnya Kulkarni1, Andrew Stranieri1, Siddhivinayak Kulkarni1, Julien Ugon1 and Manish Mittal2, 1Federation University, Australia and 2Lakeimaging, Australia
Natural Language Processing Through Different Classes of Machine Learning
Harsh Jain and Keshav Mathur, BMS College of Engineering, India
3D Modelling, Simulation and Prediction of Facial Wrinkles
Sokyna Al-Qatawneh1, Ali Mehdi2 and Thamer Al Rawashdeh1, 1University of Jordan, Jordan and 2Electronic University, Saudi Arabia
Neural Network Approach to Railway Stand Lateral SKEW Control
Peter Mark Benes, Matous Cejnek, Jan Kalivoda and Ivo Bukovsky, Czech Technical University, Czech Republic
Another Adaptive Approach to Novelty Detection in Time Series
Matous Cejnek, Peter Mark Benes and Ivo Bukovsky, Czech Technical University, Czech Republic
Resource Allocation Using Metaheuristic Search
Andy M. Connor and Amit Shah, Auckland University of Technology, New Zealand
Are Evolutionary Algorithms Required to Solve Sudoku Problems?
Sean McGerty and Frank Moisiadis, University of Notre Dame, Australia
Hybrid Ant Colony Optimization for Real-World Delivery Problems Based on Real Time and Predicted Traffic in Wide Area Road Network
Junichi Ochiai and Hitoshi Kanoh, University of Tsukuba, Japan
The Research of Induced Current in Coils When the Process of Motion of Magnetically Levitated Planar Actuators
Rougang Zhou, Yunfei Zhou, Guangdou Liu and Xiao Tu, University of Science & Technology, China
Bayesian Methods for Assessing Water Quality
Khalil Shihab1 and Nida Al-Chalabi2, 1Victoria University, Australia and 2SQU, Oman
A Recommender System Sensitive to Intransitive Choice and Preference Reversals
Amir Konigsberg and Ron Asherov, General Motors R&D, USA
Parallel Guided Local Search and Some Preliminary Experimental Results for Continuous Optimization
Nasser Tairan1, Muhammad Asif Jan2 and Rashida Adeeb Khanum3, 1King Khalid University, KSA, 2Kohat University of Science & Technology, Pakistan and 3University of Peshawar, Pakistan
Design and Implementation of a Cache Hierarchy-Aware Task Scheduling for Parallel Loops on Multicore Architectures
Nader Khammassi and Jean-Christophe Le Lann, ENSTA Bretagne, France
Real Time Face Detection on GPU Using OPENCL
Narmada Naik and Rathna.G.N, Indian Institute of science, India
Positive Impression of Low-Ranking Microrn as in Human Cancer Classification
Feifei Li, Yongjun Piao, Meijing Li, Minghao Piao and Keun Ho Ryu, Chungbuk National University, South Korea
Latent Semantic Word Sense Disambiguation Using Global Co-Occurrence Information
Minoru Sasaki, Ibaraki University, Japan
Modeling of Speech Synthesis of Standard Arabic Using an Expert System
Tebbi Hanane and Azzoune Hamid, USTHB, Algeria
A Model of Correlated Ageing Pattern for Age Ranking
Onifade O.F.W and Akinyemi J.D, University of Ibadan, Nigeria