Academy & Industry Research Collaboration Center (AIRCC)

Volume 6, Number 6, May 2016

The Sixth International Conference on Computer Science, Engineering and Information Technology (CCSEIT 2016) Vienna, Austria, May 21~22, 2016
Volume Editors : Jan Zizka, Dhinaharan Nagamalai
ISBN : 978-1-921987-51-9                                                                                                                             Download full Proceedings

Smart as a Cryptographic Processor 
Saroja Kanchi, Nozar Tabrizi and Cody Hayden, Kettering University, USA

Effects of The Different Migration Periods on Parallel Multi-Swarm PSO 
S¸aban Gülcü1 and Halife Kodaz2, 1Necmettin Erbakan University, Turkey and 2Selcuk University, Turkey

Applications of the Erlang B and C Formulas to Model a Network of Banking Computer Systems -
Moving Towards Green IT and Performant Banking
 
Florin-Catalin ENACHE and Adriana-Nicoleta TALPEANU,
The Bucharest University of Economic Studies, Romania


Configuration of a Guidance Process for Software Process Modeling 
Hamid Khemissa1 and Mourad Oussalah2, 1USTHB University, Algeria and 2University of Nantes, France

Using Mutation in Fault Localization 
Chenglong Sun and Tian Huang, Chinese Academy of Sciences, China

Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in Multiply Sectioned Bayesian Networks 
Dan Wu and Sonia Bhatti, University of Windsor, Canada

Weights Stagnation in Dynamic Local Search for SAT 
Abdelraouf Ishtaiwi, University of Petra, Jordan

Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Techniques and Deep
Learning Model
 
Luca Petricca1, Tomas Moss2, Gonzalo Figueroa2 and Stian Broen1,
1Broentech Solutions A.S., Norway and 2Orbiton A.S. Horten, Norway


Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework 
Josip Arnerić1 and Tea Poklepović2, 1University of Zagreb, Croatia and 2University of Split, Croatia

Modified Vortex Search Algorithm for Real Parameter Optimization 
Berat Dogˇan, Inonu University, Turkey

Analysis of Rising Tutition Rates in The United States Based on Clustering Analysis and Regression Models 
Long Cheng and Chenyu You, Rensselaer Polytechnic Institute, USA

Performance Evaluation of Trajectory Queries on Multiprocessor and Cluster 
Christine Niyizamwiyitira and Lars Lundberg, Blekinge Institute of Technology, Sweden

Exploring Peer-To-Peer Data Mining 
Andrea Marcozzi and Gianluca Mazzini, Lepida SpA, Italy

Enhanced Protocol for Wireless Content-Centric Network 
Chan-Min Park, Rana Asif Rehman, Tran Dinh Hieu and Byung-Seo Kim, Hongik University, Republic of Korea

Projection Profile Based Number Plate Localization and Recognition 
Sandipan Chowdhury1, Arindam Das2, and Punitha P2, 1University of Calcutta, India and
2HCL Technologies, India


A Text Mining Research Based on LDA Topic Modelling 
Zhou Tong and Haiyi Zhang, Acadia University, Canada

Management Architecture for Dynamic Federated Identity Management 
Daniela Pöhn and Wolfgang Hommel, Leibniz Supercomputing Centre, Germany

Surveillance Video Based Robust Detection and Notification of Real Time Suspicious Activities in
Indoor Scenarios
 
Nithya Shree R, Rajeshwari Sah and Shreyank N Gowda, R.V.College of Engineering, India

Majority Voting Approach for the Identification of Differentially Expressed Genes to Understand
Gender-Related Skeletal Muscle Aging
 
Abdouladeem Dreder, Muhammad Atif Tahir, Huseyin Seker and Muhammad Naveed Anwar,
The University of Northumbria, United Kingdom


Vulnerabilities of the SSL/TLS Protocol 
Jelena Ćurguz, Post of Republic of Srpska in Banja Luka, Bosnia and Herzegovina

Semantic Analysis Over Lessons Learned Contained in Social Networks for Generating Organizational
Memory in Centers R&D
 
Marco Javier Suárez Barón, UNITEC/FODESEP, Colombia