Call for Participation - 7th International Conference On Soft Computing, Artificial Intelligence And Applications

SCAI 2018


Artificial Intelligence



Call for Participation - 7
th
International Conference On Soft Computing, Artificial Intelligence And Applications (SCAI-2018)
December 22-23, 2018,Sydney, Australia
Call for Participation
We invite you to join us in Sydney, Australia on December 22-23, 2018, for 7
th
International Conference On Soft Computing, Artificial Intelligence And Applications (SCAI-2018)
The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects of the artificial intelligence, soft computing
Highlights of SPPR 2018 include:
Invited talk from eminent Professors
Submission of 150 papers from North America to Australia and selection of only Quality papers
8th International Conference on Computer Science, Engineering and Applications (ICCSEA-2018) December 22-23, 2018, Sydney, Australia
9th International Conference on Wireless, Mobile Network & Applications (WiMoA-2018) December 22-23, 2018, Sydney, Australia
10th International Conference on Grid Computing (GridCom-2018) December 22-23, 2018, Sydney, Australia.
7th International Conference of Networks and Communications (NECO-2018) December 22-23, 2018, Sydney, Australia
9th International Conference on Ubiquitous Computing (UBIC-2018) December 22-23, 2018, Sydney, Australia
7th International Conference on Signal, Image Processing and Pattern Recognition (SPPR 2018) December 22-23, 2018, Sydney, Australia
9th International Conference on Internet Engineering & Web Services (InWeS-2018) December 22-23, 2018, Sydney, Australia
9th International Conference on Communications Security & Information Assurance (CSIA-2018) December 22-23, 2018, Sydney, Australia
Registration Participants
Non-Author / Co-Author/ Simple Participants (no paper)
350 USD (With proceedings)
For registration and details mail:
scai2018@yahoo.com
(or)
scai_conf2018@iccsea2018.org
Accepted Papers
TOMOGRAPHIC SAR INVERSIONFOR URBAN RECONSTRUCTION
Karima Hadj-Rabah, Faiza Hocine, AssiaKourgli and AichoucheBelhadj-Aissa, University of Sciences and Technology Houari Boumediene (USTHB), Algeria
A PSEUDO-SPLICINGALGORITHM FORPARTIAL FINGERPRINT RECOGNITION BASED ON SIFT
Zheng Zhu, Aiping Li*, Rong Jiang, Yulu Qi, Dongyang Zhao, Yan Jia, National University of Defense Technology, China
VIEW-PODS: NAVIGATION AND READING ASSISTING WEARABLE FOR VISUALLY IMPAIRED
M.L.M. Fernando, W.S.M. Fernando, I.H. Dolawatta, N.T.C. Athukorala, Dr. Pradeepa Samarasinghe, Sri Lanka Institute of Information Technology New Kandy Road,Sri Lanka
Paradigm Based Morphological Analyser For The Gujarati Language
Dikshan N Shah
1
and Dr. Harshad Bhadka
2
,
1
Gujarat Technological University, India and
2
C U Shah University, India
Development of Handcrafted Rule-Based Approach to Improve POS tagger for Indo-Aryan language
Dikshan N Shah
1
and Dr. Harshad Bhadka
2
,
1
Gujarat Technological University, India and
2
C U Shah University, India
Possibilities of Python based emotion recognition
Primoz Podrzaj and Boris Kuster, University of Ljubljana, Slovenia.
A Post-Processing Method Based On Fully Connected CRFS for Chronic Wound Images Segmentation and Identification
Junnan Zhang and Hanyi Nie, NUDT, China.
Integrating EMOJI’S In Determining User Sentiment on Twitter
Shurug Alkhalifa and Hind AlMahmoud, King Saud University, Saudi Arabia
MRI And CT Image Fusion Based Structure-Preserving Filter
Qiaoqiao Li, Guoyue Chen, Xingguo Zhang, Kazuki Saruta and Yuki Terata, Akita Prefectural University, Japan
Bag of Embedding Words for sentiment analysis of Tweets
Gálvez Arias, Pierina Xiomara Guzmán Ramos, Pedro Jesús Chipana Vila, Luis Antonio , Trigoso Valeriano and Carlos Alberto, ESAN University, Peru
A Genetics Clustering-Based Approach For Weblog Data Cleaning
Amine Ganibardi and Chérif Arab Ali, University of Vincennes in Saint-Denis, France
A Recommendation System for Educational Data Mining Techniques
Mosima Anna Masethe and Sunday Ojo, Tshwane University of Technology, South Africa
Dexplore: A Framework For Constructing Effective Mobile Benchmark Suites
Zachary Yannes and Gary Tyson, Florida State University, USA
Virtual AIS generation management system for waterway risk assessment
JunSik Kim
1
and SeungWook Hong
2
and Suhyun Park
3
,
1
Dongseo University,Korea,
2
Sasang-gu,Korea and
3
Dongseo University,Korea.
Bit rate and Task Scheduling for Multimedia Big Data in Mobile Clouds
Byeongok Choi and Chae Y. Lee, KAIST, Korea.
New Version Of The Application Saite Store 2.0 - Experience Report On The Development Of A Brazilian Open Virtual Library
Ana Emilia Figueiredo de Oliveira, Katherine Marjorie Mendonça de Assis, Camila Santos de Castro e Lima, Carla Galvão Spinillo, Elza Bernardes Monier, Maria de Fatima Oliveira Gatinho, and Marcelo Henrique Monier Alves Junior, Federal University of Maranhão, Brazil.
An Incentive Mechanism For Computation Offloading In Mobile Edge Computing Using Block chain Technology
Ramtin Ranji, Ali Mohammed Mansoor and Sakhr Ahmed Hatem, University of Malaya, Malaysia.
Secure Group Key Management Protocol for Grid Computing
Mohammad R. Hassan
1
, Nidal M. Turab
2
, Khalil H. Al-Shqeerat
3
and Saleh El-Omar
1
,
1,2
Al-Ahliyya Amman University Jordan and
3
Qassim University, Saudi Arabia.
Scalable Dynamic Locality-Sensitive Hashing For Structured Dataset on Main Memory and GPGPU Memory
Toan Nguyen Mau and Yasushi Inoguchi, JAIST, Japan.
A novel SMP-based survivability precise evaluation metric and approach in wireless sensor network routing layer
Hongsong Chen
1,2
and Zhongchuan Fu
3
,
1
University of Science and Technology Beijing, China.
2
Beijing Key Laboratory of Knowledge Engineering for Materials Science,China
3
Harbin Institute of Technology,China.
A Hilbert-Huang Transformation and statistic combination approach to detect LDoS attack in wireless sensor network
Hongsong Chen
1,2
and Zhongchuan Fu
3
,
1
University of Science and Technology Beijing, China.
2
Beijing Key Laboratory of Knowledge Engineering for Materials Science, China
3
Harbin Institute of Technology, China.
Enhancing Computer Network Security Environment by Implementing the Six-Ware Network Security Framework (SWNSF)
Rudy Agus Gemilang Gultom and Tatan Kustana, Indonesia Defense University, Indonesia.
COMPARATIVE ANALYSIS OF THE MEASUREMENT PARAMETERS OF QOS ON A CISCO 2800 ROUTER WITH STATIC ROUTING BY APPLYING PACKET SCHEDULING ALGORITHMS
Malena Cecilia Castro Caro
1
, Luz Enith Márquez Cantillo
2
, José Duván Márquez Díaz
3
,
1
Institución Universitaria ITSA, Colombia,
2
Institución Universitaria ITSA, Colombia and
3
Universidad del Norte, Colombia
DEEP LEARNING BASED LANE AND VEHICLE TRACKING FOR AUTONOMOUS CARS
Masum Celil Olgun, Kadir Metin Akpolat, Zakir Baytar, Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey
PHISHING DETECTION FROM URLS BY USING NEURAL NETWORKS
Saide Işılay Baykal, Deniz Bulut, and Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey
ADAPTABASE - ADAPTIVE MACHINE LEARNING BASED DATABASE CROSS-TECHNOLOGY SELECTION
Shay Horovitz, Alon Ben-Lavi, Refael Auerbach, Bar Brownshtein,Chen Hamdani and Ortal Yona, College of Management Academic Studies, Israel
DIVERSE RANKING APPROACH IN MCDM BASED ON TRAPEZOIDAL INTUITIONISTIC FUZZY NUMBERS
Norzanah Abd Rahman
1
and Zamali Tarmudi
2
,
1
University Teknologi MARA (Sabah Branch), Malaysia and
2
University Teknologi MARA (Johor Branch), Malaysia
COMPUTER VISION, DEEP LEARNING, SVM, RANDOM FOREST TO DETECT DISEASES IN BLUEBERRY LEAVES
Cecilia Sullca, Carlos Molina, Carlos Rodríguez and Thais Fernández, Universidad ESAN, Perú
Rough approximation operators on matroids via circuits
Lingling Mao
1
, Zaibin Chang
1
and Jingqian Wang,
2
1
Xi’an Traffic Enginering University, China
2
and Shaanxi University of Science & Technology, China
Residential Load Profile Analysis using Clustering Stability
Fang-Yi Chang
1
,
2
Chia-Wei Tsai,
3
Shu-Wei Lin and
3
Po-Chun Kuo,
1,3
Institute For Information Industry, Taiwan and
2,3
Southern Taiwan University of Science and Technology, Taiwan.
SOFT COMPUTING ALGORITHMS IN TRAVEL MODE SELECTION
Kostandina Veljanovska, University St. Kliment Ohridski, Republic of Macedonia
ANTI-VIRUS TOOLS ANALYSIS USING DEEP WEB MALWARES
Igor Mishkovski
1
, Sanja Šćepanović
2
, Miroslav Mirchev
1
and Sasho Gramatikov
1
,
1
University Ss. Cyril and Methodius,Macedonia and
2
Aalto University, Finland
FROM OPEN RELATION EXTRACTION TO SEMANTIC WEB: A RULE-BASED STRATEGY
Julio Hernandez, Cinvestav, Mexico
INFORMATION GATHERING SYSTEMS FOR PENETRATION TESTING: SURVEY AND AN IMPLEMENTATION
Damla Dinler and Ozgur Koray Sahingoz, Kultur University,Turkey
CYBER-ATTACKS ON THE DATA COMMUNICATION OF DRONES MONITORING CRITICAL INFRASTRUCTURE
PHadjer Benkraouda, Ezedin Barka, and Khaled Shuaib,United Arab Emirates University,UAE
ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak,Faculty of Computer Science and Management Wroclaw University of Science and Technology Wroclaw, Poland
Efficient and Secured Transactions of Data in Crucial Network using Blockchain Technology
Manoj Athreya A, Ashwin A Kumar, Nagarajath S M and Gururaj H L, Vidyavardhaka College of Engineering, India