February 15th, 2016: Welcome Reception (Emerald Room, 2F)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

February 15th, 2016

Delegate Arrival & Pre-Conference Tour : TBD

13:00-16:00
16:00-18:30

Registration & Poster Presentation

18:30

Welcome Reception (Emerald Room, 2F)

February 16th, 2016


Lottee Legend Saigon Hotel

08:00-09:00

Registration
Conference Opening (Emerald Room, 2F)

09:00-09:10

Plenary Session Chair: Hyuncheol Kim

09:10-10:00

Keynote: "ThingStore An Internet-of-Things Platform for Development and Deployment of Cyber-Human Systems", Kien A. Hua, U.S.A

10:00-10:50

Keynote:

10:50-11:00

Coffee Break

11:00-11:50

Keynote:

11:50-13:00

Lunch

Types

Oral Presentation

Rooms

Emerald Room 1

Emerald Room 2

Session 1: Convergence of Healthcare and


M-ID

Information Technology
Title

Session 2: Networks and Information Systems


M-ID

The Application of Digital


302926

401401

Health Content Using Mobile

MANET Routing
User Acceptance of SaaS ERP
146300

Prescription Utilizing Virtual

161111

Fitness
Computational Technologies in

675369

Spread Sport Leisure Culture

955104

the Detection of Dyslexia

308472

The ICT Technology for


Review Paper on the nutritional
information Using Mobile
Augmented Reality Technology

269095

195912

Unmanned Aerial Vehicle with


Moving-Object Detection and Face

Risks in Social Networking

321198

control mechanisms to mitigate


starvation in wireless mesh

757012

for Mobile P2P Networks: A


Survey
Simulation of Scheduled Traffic

742041

A dropout distribution model on


deep transfer learning networks

185794

for the IEEE 802.1 Time

Avoidance Technique for Worst


Situation in Zigbee Communications

478654

Big Data Visualization: Application


in Visualizing Learning Activities

199500

An Information System to support


the anti-doping process

Research on 3D Directional

542773

WARP : Web-based Adaptive


Remote-desktop Protocol for VDI

155211

Sensing Model

347394

The SI-LBP: A New Framework for


Obtaining 3D Local Binary Patterns

Sensitive Networking

from Shape-Index
Convolutional Neural Network Models

823484

Selecting Method using


Weather Information and
OPNET-Based Performance

983033

Analysis of a Multi-Agent

The Application of IC
Ticketing System in Clinic
Fees Payment in Taiwan

A Performance Study of Hidden

946751

using BU-3DFE Database

Markov Model and Random


Forest in Internet Traffic

AVM Auto-Calibration for

Data Pre-Processing of Student e-

for Facial Expression Recognition

Driving Images

Architecture for Managing the

Session Chair:

919045

An Object-Oriented Programming

999777

Session Chair:

Interface for Low-tier Text-based


Windowing Systems

Learning Logs

388318

Medical Image Segmentation


using Improved Chan-Vese Model

553090

CoAP Message Transfer over


NFC in Internet of Things

Session Chiar:
Coffee Break

Types

Oral Presentation

Rooms

Emerald Room 1

Emerald Room 2

Emerald Room 3

Session 4: Networks and Information Systems

Session 5: Networks and Information Systems

Session 6: Middleware and Operating Systems

M-ID

355175

367621

Title

Data Prefetching Scheme


based on Data Relevancy for
Peer-to-Peer Networks
Sustainability of Big Data
Servers Under Rapid
Changes of Technology

M-ID

573556

UTILIZATION VIA DUAL BEAM


ANTENNA IN THE LIVE UMTS

620162

727128

Construction of Log Periodic Dipole

CLOUD ENTERPRISE RESOURCE

Algorithms: Manage Computation and

597630

727401

Communications-Based
Technology for Smart Grid Test
Bed Using OPNET Simulations

Dynamic TDMA for Networked


Embedded Systems

Solar Radio Burst Study

814013

The International Cooperation of


Solar Radio Burst Project Using eCallisto System Network

727872

An Automated System for Signal

569986

Detection of Solar Radio Burst Type II


Due to Coronal Mass Ejections

Driver Fatigue Detection


Analysis of Chemical Plant Process

759997

Phenomena

788272
Session Chair:

Session Chair

136332

cache effect optimisationin

Scheduling algorithms for

Safety Information Integration Model

476984

931813

247070

HYFLUR: Recovery for Power-off


Failure in Flash Memory Storage

254965

286686

340697

Static scheduling generation for


Multicore partitioned systems
Improve Dynamic Sandbox on the
Cloud with non-QEMU based OS
through Hooks and Mocks
techniques
Exploring the Platform for Expressing
SystemVerilog Assertions in Model

972829

348079

407256

Enhanced Cloud Data Placement


Strategy for Multiple Cloud Storage

Design of Multimedia File

494916

Similarity Evaluation Scheme

545617

Virtualization(NFV) platform for

using Fingerprinting
Network Function
wellness in high-speed network
Transmission optimization of

744159

Over the Air Programming

Jamming-Resilient Adaptive
Network Protocol in
Wireless Networks

Method for Learning Wireless


Sensor Networks

Cooperative Robust Output


Regulation for Linear Uncertain
Time-Delay Multi-Agent Systems

Translating Basic Metric


Temporal Logic Formulas into

346836

Possibilities of Control and


675451

Promela

M-ID

Title

350984

Design of Maritime Meteorological


Information Data Model Based on
S-100

884997

Scheme for Streaming Multiprocessors

177661

Full-Domain Generalization for


Incremental Data Publishing

Automated Segmentation
140637
of Microtubules in Cryo-EM Images with Excessive White Noise
Emerald Room 3

Session 8: Data Mining and Artificial Intelligence

Session 9: Data Mining and Artificial Intelligence

Privacy Preservation based on

Title

M-ID

Title

748946

A Modified Shuffled Frog


Leaping Algorithm using
Truncated Gaussian

Development of Power Quality


140572

CTA-aware Dynamic Scheduling


in High-Performance GPUs

Emerald Room 2

M-ID

Optimization of Traffic at
Crossroads Using Petri Nets

Session Chiar:

Oral Presentation

Session 7: Security and Privacy

healthcare information for


multi-channel cloud networks

Registration

Emerald Room 1

Enhanced by Hole Filling Algorithm

Services on Mobile Devices.

from Information System Perspective

241367

Action Recognition using


Extended Gaussian Mixture Model
(GMMHF) Utilize GPU Acceleration

Lottee Legend Saigon Hotel

Rooms

Non-Rigid Object Tracking using


Modified Mean-Shift Method

Multi-Dimensional Dynamic

Based System Engineering

February 17th, 2016

Types

Astronomical Object Imaging

Exploring Multi-Feature Based

657939

Systems Using HYbrid FLUsh Recovery

Session Chair:

08:00-08:30

Study of Point Spread Function of

partitioned systems

Limit Data Replication with Quorums

The Significance of e-Callisto System and


Antenna (LPDA) and CALLISTO System for

Drone for Wideband

Scaling Distributed All-Pairs

erence

536653

Title

PLANNING ADOPTION IN

Recipe-transition Graph based


on Asymmetric Entropy Di

M-ID

Communication and LongFACTORS INFLUENCING

NETWOR

526449

Title
Design and Implementation of

583903

OPTIMIZATION DOWNLINK POWER

08:30-10:20

Title

Adopting multi-radio channel


approach in TCP congestion

Cooperative Caching Strategies

Recognition

A Content Analysis on Top

15:00-15:10

15:10-17:10

320958

Live Migration Destination

116833
Session Chair

Segmentation for Outlier Iris


Image

M-ID

Implementation of Autonomous

Considering Perceived Risk ,

Focusing on the IT-based


Geriatric Diseases Healthcare

A Comparative Study on Edge


Detection and Hough Transform

Set up from 16:00 to 18:30, February 15th, 2016

using OPNET

A New Paradigm for the

970209

Title

Design and Configuration of

Review of the Role of Modern


612234

644845

System Performance and Cost

Personalized Exercise

13:00-15:00

Improvisation of ACO based

Device

Physical Activity in the Disabled


480850

M-ID

The Applications of
Convergence Technology for

Session 3: Multimedia and Visualization

Title
An Adaptive, Fault Protected

459822

Poster Presentation (not cofirmed yet)

Emerald Room 3

Index using Ideal Analytic


Hierarchy Process

Cost-Effective Multicast Routing

561195

with Multi-Gateway in Wireless


Mesh Networks

387286

Robust Visual Communication


System in Mobile Environments

315196

197208

SENSORS IN PRIVATE CLOUD

08:30-10:20

Paths of Injection-Production in Single Sand

A Computational Agent Model

373059

A New Probabilistic Digital


Signature Scheme based on
Integer Factorization Problem

239727

Kalman Filter-based Aggressive


Behaviour Detection for Indoor
Environment

440402

Android Mobile Application for


Privacy Data Access in MANET
Emergency Services

296817

Effectiveness Comparison of
Range Estimator For Battery
Electric Vehicles

592663

627793

The Capacity of Undetectable


On/Off Covert Channel
Quality Analysis of Logging
System Components in the Cloud
Copy-Move Forgery Detection
using on Locality Sensitive Hashing
and k-means Clustering

942268

System based on the Thailand Marketing Research Society

980278

(TMRS) Standardized SES Classification for Thai Upcountry

Emerald Room 1

Detection and Analysis

Title

972329

Range Image Derivatives for


GRCM on 2.5D Face Recognition

714949

A complete fingerprint matching


algorithm on GPU for a large scale

Hierarchical Time Series


Forecast in Electrical Grids

10:30-12:00

Android security analysis base on


inter application relationships

362754

Title

M-ID

454326

535761

Security Maturity in Higher


Education Institution

636364

917735

Secret outflow cause symptom


analysis through scenario
Assessment

669111

672495

Session Chair:

Session Chair

ORIENTED REQUIREMENTS ENGINEERING


PROCESS

A New Extraction Algorithm for


Hierarchical Keyword using Text

391497

A Propose Model for Shared


Understanding of Software
Requirements (SUSRs)

Layer-wise Relevance Propagation


for Deep Neural Network
Architectures

458631

A New Mathematical Concept of


Programming into Graphs

Analyzing the Risk by Integrating the


Fuzzy Logic and the Improved Fuzzy

462966

ISLAMIC NEW MOON SOFTWARE:


CURRENT STATUS

470005

A Study on Decoupling Flow


Engines toward Cross-Platform
Interoperability

Clustering Algorithm FCM-R

Detection of SPAM Attacks in the


Remote Triggered WSN
Experiments

Improving Intrusion Detection on


Snort Rules for Botnet Detection

THE RESULT OF ORGANIZATION GOAL-

Building a Hybrid Method for

601340

813480

989056

Title
INFORMATION SYSTEM DESIGN BASED ON

Social Network

An Analysis of IT Assessment

783953

Emerald Room 3

Meta Learning on Small


Biomedical Datasets

Visualization of gaps between

Challenges in the Data Collection


for Diagnostics of Smart Buildings

683350

sheet parts for watertightness


of automobiles
Delay-Energy Aware Clustering

A Case Based Reasoning View of


School Dropout Screening

676010

Multi-hop Routing in Wireless


Sensor Networks

Session Chair:

Session Chair:

12:00-13:20

Lunch

Types

Oral Presentation

Rooms

Emerald Room 1

Emerald Room 2

Emerald Room 3

Session 13: Web Technology

Session 14: Internet of Things

Session 15: Software Engineering

M-ID

M-ID

M-ID

M-ID

M-ID

222702

Sentiment analysis and user


similarity for social recommender

221007

A Survey of Security Aspects


for Internet of Things in
Healthcare

965440

system: An experimental study.

321665

Adaptive Polling for


Responsive Web
Applications

361412

Thai Social Networking Data in

281791

A Framework of Incorporating
Online Marketing Survey

13:20-15:20

Challenges, and Research

771892

Stocks Trading Using MLP and

553182

Ontology based Adaptive,


Semantic E-Learning
Framework (OASEF)

511277

Opportunities
Decision Support for the
565890

Data Mining Techniques

503151

Preserving Dynamic XML


Keys

Smart Door Lock System

Estimation of Fault Reparation


Time in Software Maintenance
Phase

Generation of Java Code from

Interference on the Functioning of the

672166

Terrestrial Segment of Flying Ubiquitous

UML Sequence and Class


Diagrams

Analysis of routes in the


network based on a swarm
of UAVs
Extension of oneM2M
Protocol Binding
Considering Service

387632

A Framework on Cloud Based


Connected Car Services
Session Chair:

Enterprise Modelling for the

742686

Internet of Things: the


ComVantage Method
A conceptual framework for the design of

895936

Tutorial: Introduction to Massively Parallel


Processing

an urban flood early-warning system using


a context-awareness approach in internetof-things platform

Session Chair:

Session Chair

564481

Sensor Network

Recommender Systems: Issues,

466859

the Core Segments and their Components

A Study on the IoT based

Influence of Intentional Electromagnetic

374245

Title
Conceptual Design Model of iCAL4LA: A
Review and Critical Analysis of Computer
Assisted Learning Concept in Determining

Session Chair:
Coffee Break

15:20-15:30
Types

Oral Presentation

Rooms

Emerald Room 1

Emerald Room 2

Session 16: ICT Convergence

Session 17: ICT Convergence

M-ID

Title
Optimized Data Transmission

148022

Method for Multimedia

671586

Load Balancing Methodology


for Efficient Real-time

784384

for Application Deployment

893676

based on Docker and AWS


cabbage of origin
discrimination software
Wearable Interface Area and
Suggesting Interaction
Session Chair:

General, Haze, Low Light, Back-light

Tutorial: Introduction to Massively Parallel


Processing (Continued)

A New Prefetch Policy for Data

999437

Filter Cache in Energy-aware


Embedded Systems

The Smart Armband: Expanding

554549

Image Enhancement System for


Condition

Implementation of Chinese

334659

Live Streaming and VOD Sharing for


Design of Adaptive Integrated Fast

A New Virtualized Environment

303920

Architecture Design with Coordinating


Media Content Distribution

Streaming Service Based on

15:30-17:00

Frequency Features Selection using


Decision Tree for Classification of
Sleep Breathing Sound

Services based OpenStack

219248

Emerald Room 3

User-Assisted OCR on Outdoor

999666

Images for Approximate


Positioning
Session Chair:

Introduction to Graduate program in


Korea

17:00-18:00

Closign Dinner Party @ Local Restaurant

February 18th, 2016


Technical Visit: TBD
ICISA 2016 End

Development of Android Security


Permission Application

Modeling Promotion Factors

for Rosewood Crime Arrest

Session12: Software Engineering

Intelligent and Adaptive Test


System

571460

712446

199196

Session Chair:

M-ID

identification system

775641

Review of Security Vulnerabilities


in the IPv6 Neighbor Discovery
Protocol

Description with Geo-tagged


Web Photos
Association Rule Discovery

Measuring the Effectiveness of


Corporate

Session 11: Data Mining and Artificial Intelligence

508459

332910

using Bayesian Networks and


Video Games
Administrative Divisions of Addresses
Matching Algorithm based on Moving
Window Algorithm for Maximal
Matching

636545

Emerald Room 2

M-ID

Attack on a nonlinear inter-pixel


computing and swapping based
permutation approach

Planning

Application of Fuzzy C-Mean


Clustering Base Tree for

Session Chair:

Session 10: Security and Privacy

18:00-21:00

Automated Disease outbreak

Coffee Break

Rooms

547438

Generating Point of Interest

Urban Subjects

429320

10:20-10:30

Session Chair

884722

Extending the Socio-Economic Status (SES) Prediction

Session Chair:

Session Chair

826201

for Stress Reaction in Natural


Disaster Victims

431951

CNN for Face Recognition with


Object, Human and Face

of Big Data

206277

566863

760183

Body in Old Oilfields under the Background

Synflood Spoof Source DDOS


Attack Defence Based on Packet
ID Anomaly Detection - PIDAD

957488

A Surveillance System using

An Improved Algorithm for Calculating Flow

CREATING SNORT-IDS RULES FOR


DETECTION BEHAVIOR USINGMULTI-

Planning in dynamic, distributed


and non-automatized production
systems

You might also like