SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Second International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC2015)
-
Increasing the Target Prediction Accuracy of MicroRNA Based on Combination of Prediction Algorithms
MicroRNA is an oligonucleotide that plays a role in the pathogenesis of several diseases (mentioning Cancer). It is a non-coding RNA that is involved in the control of gene expression through the ...Authors: Mohammed Q. Shatnawi, Mohammad S. Alhammouri, Kholoud Mahmoud Mukdadi
Year Published: Dec. 2015 | 1-8 | DIPDMWC2015 -
Clinical Prediction of Teeth Periapical Lesion based on Machine Learning Techniques
Dentists used to diagnose teeth periapical lesion according to patient’s dental x-ray. But most of the time there were a problematic issue to reach a definitive diagnosis. It takes too much time, ...Authors: Yasmine Eid Mahmoud, Soha Safwat Labib, Hoda M. O. Mokhtar
Year Published: Dec. 2015 | 9-15 | DIPDMWC2015 -
Extraction of Causalities and Rules Involved in Wear of Machinery from Lubricating Oil Analysis Data
Recently, methods in order to diagnose wear conditions of the equipments have been established. Lublicating oil analysis is one of these methods. However, since relations between events in ...Authors: Daisuke Ide, Atsushi Ruike, Masaomi Kimura
Year Published: Dec. 2015 | 16-22 | DIPDMWC2015 -
'Fuzzy' vs 'Non-Fuzzy' Classification in Big Data
Due to the huge increase in the size of the data it becomes troublesome to perform efficient analysis using the current traditional techniques. Big data puts forward a lot of challenges due to its ...Authors: Malak EL-Bakry, Soha Safwat, Osman Hegazy
Year Published: Dec. 2015 | 23-32 | DIPDMWC2015 -
On Definition of Automatic Text Summarization
Research in the continuously growing field of automatic text summarization is branched into extractive and abstractive approaches. Over the past few decades, major advances have occurred in ...Authors: Pashutan Modaresi, Stefan Conrad
Year Published: Dec. 2015 | 33-40 | DIPDMWC2015 -
Predictive Analytics of Student Graduation Using Logistic Regression and Decision Tree Algorithm
Educational data mining is an emerging area of data mining application. It is concerned in describing and predicting patterns into huge amount of data usable to educational settings. One main topic ...Authors: Ace Lagman, Shaneth Ambat
Year Published: Dec. 2015 | 41-48 | DIPDMWC2015 -
Sentiment Analysis of Social Media for Evaluating Universities
In the age of digitalization, a huge amount of sentiments are expressed daily on university related topics using social media platforms. Particularly, posted statements from students and teachers ...Authors: Anas Abdelrazeq, Daniela Janssen, Christian Tummel, Sabina Jeschke, Anja Richert
Year Published: Dec. 2015 | 49-62 | DIPDMWC2015 -
Adopting Games Development and Visual Curriculum Design (VCD) Framework for Connected eLearning
Games development offers potentials for both learning or teaching computer science (CS) and programming. It is especially useful as learners are able to see the application of concepts and ...Authors: Hock Chuan Lim
Year Published: Dec. 2015 | 63-68 | DIPDMWC2015 -
Brain - Computer Interface for Communication via Record Electrophysiological Signals
The brain-computer interface (BCI) aim to use Electroencephalography (EEG) activity or other electrophysiological measures of brain functions as new non-muscular channels for communication with ...Authors: Svetla Radeva, Dimitar Radev
Year Published: Dec. 2015 | 69-76 | DIPDMWC2015 -
Graph-type Classification Based on Artificial Neural Networks and Wavelet Coefficients
Typically, in many documents, there are graphs that authors use to illustrate their points. To utilize the information in such graphs via an automated process, we must extract semantic ...Authors: Sarunya Kanjanawattana, Masaomi Kimura
Year Published: Dec. 2015 | 77-85 | DIPDMWC2015 -
Development of an Intuitive Data Transfer Application for 3D Video Communication System in Synchronized AR Space
Existing video communication systems, used in business or private life, provides file data transfer function. However, these systems need many manipulation steps by using mouse and keyboard. These ...Authors: Yuki Fujibayashi, Hiroki Imamura
Year Published: Dec. 2015 | 86-92 | DIPDMWC2015 -
A Question Answering System being able to Infer based on Definition and Acquire of Knowledge in English Text of the Written Language
In recent years, question answering systems attract attention as one of the new information search technologies. In contrast, we have proposed the new question answering system that can produce ...Authors: Kenta Hiratsuka, Hiroki Imamura
Year Published: Dec. 2015 | 93-99 | DIPDMWC2015 -
Abstraction Method of Words Based on Relationships between Subjects, Objects and Predicates
The study [1] found that relationships between the target words and their neighbor words are useful to decrease ambiguity of predicate. However, sentences usually contain many concrete words. ...Authors: Marina Naito, Masaomi Kimura
Year Published: Dec. 2015 | 100-106 | DIPDMWC2015 -
Identification and Evaluation of Keyphrases: Fuzzy Set based Scoring and Turing Test Inspired Evaluation
Automatic keyphrase extraction aims at extracting a compact representation of a single document, which can be used for numerous applications such as indexing, classification or summarization. ...Authors: Pashutan Modaresi, Stefan Conrad
Year Published: Dec. 2015 | 107-117 | DIPDMWC2015 -
Effectiveness of Scientific Methods in Detecting Phishing Websites in Jordan
In this study, we measure and evaluate the effectiveness of the scientific methods used by forensic laboratory, detective and preventive police in Amman (Jordan) for detecting phishing websites. A ...Authors: Qusai Abuein, Ahmad Ajlouni
Year Published: Dec. 2015 | 118-123 | DIPDMWC2015 -
Efficient Adaptive Tree-based Protocol for Wireless Sensor Networks
The usage of wireless sensor networks applications is becoming very important in monitoring and analyzing the environment by utilizing a number of sensor nodes. These sensing nodes are capable of ...Authors: Khaled Mousa, Amr Elsaadany
Year Published: Dec. 2015 | 124-129 | DIPDMWC2015 -
Voice Communications over WLAN on Campus: A Survey
Voice over Wireless Local Area Network (VoWLAN) technology offers significant benefits that provide wireless voice applications for universities, hospitals and enterprises. Some of these primary ...Authors: Munira A. AlShebel, Amal S. Alamr, Amjaad H. Alshammari
Year Published: Dec. 2015 | 130-136 | DIPDMWC2015 -
A 3-Dimensional Object Recognition Method Using Relationship of Distances and Angles in Feature Points
In recent years, human support robots have been receiving attention. Especially, objects recognition task is important in case that people request the robots to transport and rearrange an object. We ...Authors: Seiichi Maehara, Kazuo Ikeshiro, Hiroki Imamura
Year Published: Dec. 2015 | 137-147 | DIPDMWC2015 -
Disparity Map Estimation using Gabor Wavelet under Radiometric Changes
Stereo correspondence refers to the problem of finding the matching pixels of a 3D world point in the stereo image pairs captured at different viewpoint using two cameras. Subsequently, ...Authors: Malathi. T, M. K. Bhuyan, C. Asokan, Y. Iwahori
Year Published: Dec. 2015 | 148-156 | DIPDMWC2015 -
The Effect of Information Systems in the Information Security in Medical Organization of Shaharekord
Today`s spread of sciences and emergence of modern technologies necessitates information exchange. As a result security of information systems should be considered more seriously. The purpose of the ...Authors: Leila Rahmani Samani, Mohmmadreza Soltanaghaei
Year Published: Dec. 2015 | 157-166 | DIPDMWC2015 -
Provide a Hybrid Approach to Manage Packets Motion in Order to Congestion Control in MANET
Mobile ad hoc networks (MANET) is a system consists of mobile nodes that act as autonomous. The Network without any fixed infrastructure and there is no centralized management in this networks. ...Authors: Elahe Pourmazaherian, Mohammad Reza Soltan Aghaei
Year Published: Dec. 2015 | 167-172 | DIPDMWC2015 -
Improvement of Load Distribution and Prevention of Congestion in Ad-Hoc Wireless Networks Using Classification and Swarm Intelligence
Mobile ad hoc networks consist of mobile platforms which are formed dynamically by a group of mobile hosts. The hosts have a capability to detect, navigate and recover the link automatically. ...Authors: Somaye Mobini, Mohammad Reza Soltan Aghaei
Year Published: Dec. 2015 | 173-180 | DIPDMWC2015 -
Platforms for Use Integrated Resources Formative Processes in E-learning
In recent years there has been a rapid development of platforms for distance learning. In this paper we study solution open source with particular reference to widespread, typical of web 2.0, ...Authors: Pasquina Campanella
Year Published: Dec. 2015 | 181-186 | DIPDMWC2015 -
Learning Management Systems: A Comparative Analysis of Open-Source and Proprietary Platforms
In the context of distance education, the choice of platform for content delivery becomes a critical success factor. This paper analyzes the state of the art of e-learning platforms, Learning ...Authors: Pasquina Campanella
Year Published: Dec. 2015 | 187-192 | DIPDMWC2015 -
A Comparative Assessment of e-Learning Platforms
This paper presents a comparative analysis among elearning platforms. Some of the most widespread opensource and proprietary platforms are presented and evaluated. The results, obtained by ...Authors: Pasquina Campanella
Year Published: Dec. 2015 | 193-198 | DIPDMWC2015 -
EDA as a Discriminate Feature in Computation of Mental Stress
In computation of mental stress, various features are determined from a range of physiological signals. During stress, hormones levels inside the body of a stressed person are changed that results in ...Authors: Khalid Masood
Year Published: Dec. 2015 | 199-204 | DIPDMWC2015 -
New Approach to Simulate Operation Rooms based on Medical Devices used in Surgical Procedures
Patient safety is one of the greatest challenges in healthcare. In the operating rooms (ORs), errors are frequent and often consequential. Medical devices and specially advanced technologies have a ...Authors: Sana Ghobadi, Arash Taki, Mohammad Aziz Esmaeili
Year Published: Dec. 2015 | 205-209 | DIPDMWC2015