Home
Conference Programme
Message from Conference Chair
Paper Index
Organising & International Advisory Committee
 

 Authors Index

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Alam, Rakibul au-poon Data Collection for Local Government and Visualization for Efficient e-Governance
Alam, Rakibul au-poon1 User Feedback Based Mobile Camera Application Development
Amin, M. Ashraful au-poon Data Collection for Local Government and Visualization for Efficient e-Governance
Amin, M Ashraful au-poon1 User Feedback Based Mobile Camera Application Development
Azeem, Moazam fr-azeem Performance of MAC Protocols for Multiple Secondary Access using Erasure Recovery

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Bennet, Pauleen au-chan Assessment of electronic noses for support of a canine scent detection
Brockly, Michael us-morton Signature forgery and the forger - an assessment of influence on handwritten signature production
Buntin, Colin us-morton Signature forgery and the forger - an assessment of influence on handwritten signature production

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Chan, Ka Ching au-chan Assessment of electronic noses for support of a canine scent detection
Chen, Pei-Yin tw-ng Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking
Chokngamwong, Roongroj th-pukkasenung A Lightweight Agent-based Secure Mobile Payment Protocol Supporting Multiple Payments
Cui, Donghong cn-gui A Classifier lassifier for Dfor D for D iagnosis of iagnosis of iagnosis of Manic Psychosis sychosis State Based Based on SVM on SVM-GMM

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Dai, Chaofan cn-dai Data Provenance Tracing Approach of Wivern
Deng, Su cn-dai Data Provenance Tracing Approach of Wivern
Dyrenfurth, Michael us-oconnor Stability of Individuals in a Fingerprint System across Force Levels - An Introduction to the Stability Score Index

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Elliott, Stephen J. us-moore Interoperability and the Stability Score Index
Elliott, Stephen us-morton Signature forgery and the forger - an assessment of influence on handwritten signature production
Elliott, Stephen us-oconnor Stability of Individuals in a Fingerprint System across Force Levels - An Introduction to the Stability Score Index

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Gontarczyk, Andrew au-gontarczyk Cyber Security Zone Modeling in Practice Cyber Security Zone Modeling in Practice
Guest, Richard us-morton Signature forgery and the forger - an assessment of influence on handwritten signature production
Gui, Chao cn-gui A Classifier lassifier for Dfor D for D iagnosis of iagnosis of iagnosis of Manic Psychosis sychosis State Based Based on SVM on SVM-GMM

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Hagiwara, Ichiro jp-nakayama Modeling and Simulation for Tsunami Pod
Hasan, Nahid bd-molltalib RPB-DC: Motif Discovery Using Randomly Projected Bucketing (RPB) and Discriminative Conservation (DC) Based Prior
Hemmi, Kotaro jp-mochizuki Proposal and Evaluationvaluation of a Revised Genetic Algorithm Suitable for Traffic Signal Control
Howell, Tiffani au-chan Assessment of electronic noses for support of a canine scent detection
Hsiao, Yu-Jung tw-ng Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking
Hu, Min-Chun tw-ng Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Islam, Md. Anisul bd-molltalib1 Microarray Gene Selection using Adaptive Wrapper and Filtering Techniques

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Kabeer, Shaikh Jeeshan bd-molltalib1 Microarray Gene Selection using Adaptive Wrapper and Filtering Techniques
Kerollos, Mark Nady au-chan Assessment of electronic noses for support of a canine scent detection
Khan, Abdul Baqi fr-azeem Performance of MAC Protocols for Multiple Secondary Access using Erasure Recovery
Kim, Jun-Gun kr-lee Motion Compensated Frame I nterpolation Using Quadtree Structures

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Lai, David au-sahi Parallel Encryption Mode for Probabilistic Scheme to Secure Data in the Cloud
Lee, Jichan kr-lee Motion Compensated Frame I nterpolation Using Quadtree Structures
Lee, Seohyung kr-lee Motion Compensated Frame I nterpolation Using Quadtree Structures
Lee, Daeho kr-lee Motion Compensated Frame I nterpolation Using Quadtree Structures
Li, Yan au-sahi Parallel Encryption Mode for Probabilistic Scheme to Secure Data in the Cloud
Li, Wei cn-gui A Classifier lassifier for Dfor D for D iagnosis of iagnosis of iagnosis of Manic Psychosis sychosis State Based Based on SVM on SVM-GMM
Lim, Sungsoo kr-lee Motion Compensated Frame I nterpolation Using Quadtree Structures
Luo, Hanwen cn-gui A Classifier lassifier for Dfor D for D iagnosis of iagnosis of iagnosis of Manic Psychosis sychosis State Based Based on SVM on SVM-GMM

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Mansour, Nashat lb-mansour Bees Colony Algorithm for Proctors Assignment
McMillan, Phil au-gontarczyk Cyber Security Zone Modeling in Practice Cyber Security Zone Modeling in Practice
Mochizuki, Hiroshi jp-mochizuki Proposal and Evaluationvaluation of a Revised Genetic Algorithm Suitable for Traffic Signal Control
Moore, Zachary E. us-moore Interoperability and the Stability Score Index
Morton, Alex us-morton Signature forgery and the forger - an assessment of influence on handwritten signature production
Mottalib, Md. Abdul bd-molltalib RPB-DC: Motif Discovery Using Randomly Projected Bucketing (RPB) and Discriminative Conservation (DC) Based Prior
Mottalib, Md. Mozaharul bd-molltalib1 Microarray Gene Selection using Adaptive Wrapper and Filtering Techniques
Mottalib, Md. Abdul bd-molltalib1 Microarray Gene Selection using Adaptive Wrapper and Filtering Techniques
Mutasim, Aunnoy K au-poon Data Collection for Local Government and Visualization for Efficient e-Governance
Mutasim, Aunnoy K au-poon1 User Feedback Based Mobile Camera Application Development

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Nakayama, Eri jp-nakayama Modeling and Simulation for Tsunami Pod
Ng, Kiat Siong tw-ng Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking
Nien, Kuang-Yu tw-ng Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
O'Connor, Kevin J. us-moore Interoperability and the Stability Score Index
O'Connor, Kevin J. us-oconnor Stability of Individuals in a Fingerprint System across Force Levels - An Introduction to the Stability Score Index
O'Neill, Joe us-morton Signature forgery and the forger - an assessment of influence on handwritten signature production

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Pan, Zhongde cn-gui A Classifier lassifier for Dfor D for D iagnosis of iagnosis of iagnosis of Manic Psychosis sychosis State Based Based on SVM on SVM-GMM
Pavlovski, Chris au-gontarczyk Cyber Security Zone Modeling in Practice Cyber Security Zone Modeling in Practice
Poon, Bruce au-poon Data Collection for Local Government and Visualization for Efficient e-Governance
Poon, Bruce au-poon1 User Feedback Based Mobile Camera Application Development
Pukkasenung, Pensri th-pukkasenung A Lightweight Agent-based Secure Mobile Payment Protocol Supporting Multiple Payments

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Rahman, Mohammad Arifur bd-molltalib RPB-DC: Motif Discovery Using Randomly Projected Bucketing (RPB) and Discriminative Conservation (DC) Based Prior
Reid, William us-morton Signature forgery and the forger - an assessment of influence on handwritten signature production
Rohanian, Mojtaba ir-rohanian Sharif Spam Corpus: A Spam Filter Dataset for the Persian Language
Rohanian, Morteza ir-rohanian Sharif Spam Corpus: A Spam Filter Dataset for the Persian Language
Rudra, Tarashankar in-rudra A virtual TPM architecture for providing Infrastructure a service in cloud computing

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Sahi, Aqeel au-sahi Parallel Encryption Mode for Probabilistic Scheme to Secure Data in the Cloud
Sutton, Mathias us-oconnor Stability of Individuals in a Fingerprint System across Force Levels - An Introduction to the Stability Score Index

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Taha, Mohamad Kassem lb-mansour Bees Colony Algorithm for Proctors Assignment
Tokura, Sunao jp-nakayama Modeling and Simulation for Tsunami Pod

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Uchida, Ryosuke jp-mochizuki Proposal and Evaluationvaluation of a Revised Genetic Algorithm Suitable for Traffic Signal Control

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Vazirnezhad, Bahram ir-rohanian Sharif Spam Corpus: A Spam Filter Dataset for the Persian Language

 A B C D E F G H I J K L M N O P Q R S T U V W XY Z
Author
Paper #
Paper Title
Yoshida, Yu jp-mochizuki Proposal and Evaluationvaluation of a Revised Genetic Algorithm Suitable for Traffic Signal Control

 A B C D E F G H I J K L M N O P Q R S T U V W X YZ
Author
Paper #
Paper Title
Zhang, Xiaoyu cn-dai Data Provenance Tracing Approach of Wivern
Zhang, Jing cn-gui A Classifier lassifier for Dfor D for D iagnosis of iagnosis of iagnosis of Manic Psychosis sychosis State Based Based on SVM on SVM-GMM
Zhao, Yanpeng cn-dai Data Provenance Tracing Approach of Wivern
Zhu, Jie cn-gui A Classifier lassifier for Dfor D for D iagnosis of iagnosis of iagnosis of Manic Psychosis sychosis State Based Based on SVM on SVM-GMM




ISBN: 978-0-9803267-7-2 © ICITA 2015. All Rights Reserved.