
Presented paper in SKIMA2015
List of Papers Presented in SKIMA2015 Conference (15-17 December)
SN |
Paper Title |
Authors |
1 |
Knowledge Map on Alcohol Drinking Behavior Modification in Rural Community,Thailand (Paper Id: 69) |
Thunyaporn Jaimung, Nopasit Chakpitak and Pitipong Yodmongkol |
2 |
A Practical Way to Integrate Simulation based on SCOR Model (Paper Id: 88) |
Napaporn Reeveerakul |
3 |
Serious Game to Motivate the Knowledge Sharing among Knowledge Technicians in Machinery Relocation of Foreign Direct Investment (Paper Id: 97) |
Piang-Or Loahavilai, Nopasit Chakpitak, Pradorn Sureephong and Keshav Dahal |
4 |
Structuring Knowledge Model on 4 P’s Marketing Mix Concept of Chinese Tourism Management for Entrepreneurs Using Knowledge Engineering (Paper Id: 35) |
Jirawit Yanchinda, Arunotai Pongwat and Korawan Sangkakorn |
5 |
Visual Cryptography using Image Pixel Transparency with Cover Image (Paper Id: 98) |
Dipesh Shrestha and Sanjeeb Prasad Panday |
6 |
Real-time Mobile Enabled Scheme for Virtual Spectacle Frame Selection (Paper Id: 62) |
MdZakir Hossen, David Chik, Ashim Chakraborty and Alamgir Hossain |
7 |
Modelling of tumour-induced angiogenesis with regress by immune factor (Paper Id: 19) |
Wei Chen, Ling Shao and Li Zhang |
8 |
Towards Realizing the Smart Product Traceability System (Paper Id: 111) |
Dharmendra Mishra and Aicha SeklouliSekhari |
9 |
A Cyber-Physical model for platoon system (Paper Id: 89) |
Madeleine El-Zaher, Baudouin Dafflon and Franck Gechter |
10 |
Image Steganography: Protection of Digital Properties Against Eavesdropping (Paper Id: 108) |
Ajay Kumar Shrestha, Ramita Maharjan and Regina Basnet |
11 |
Implementation of Branchless Banking in Nepal: Challenges in Distributing Social Security Cash Transfer (Paper Id: 117) |
Mahesh Maharjan and Subarna Shakya |
12 |
Automatic Nepali Number Plate Recognition with Support Vector Machines (Paper Id: 45) |
Ashok Kumar Pant, Prashnna Kumar Gyawali and Shailesh Acharya |
13 |
Integrating romanized Nepali spellchecker with SMS based decision support system for Nepalese farmers (Paper Id: 9 ) |
BidurDevkota, Bikram Adhikari and Deepanjal Shrestha |
14 |
A Word Sense Disambiguation Method for Feature Level Sentiment Analysis (Paper Id: 118) |
Umar Farooq, Tej Prasad Dhamala, YacineOuzrout, Syed Akhter Hossain and Antoine Nongaillard |
15 |
Deep Learning Based Large Scale Handwritten Devnagari Character Recognition (Paper Id: 52) |
Shailesh Acharya, Ashok Kumar Pant and Prashnna Kumar Gyawali |
16 |
A Systematic Mapping Study on Assitive Technologies for People with Dementia (Paper Id: 119) |
IkramAsghar, S. Cang and H. Yu |
17 |
Hybrid Approach to Distributed Wi-Fi Performance Assessment for Multi-floor Structures (Paper Id: 4) |
Deepak Bhardwaj, Kotaro Kataoka, VemagantiAmithVikram andVishalHirani |
18 |
On the Study of Wireless Signal Noise for Designing Network Infrastructure of Knowledge Management Systems (Paper Id: 25) |
Chunbo Luo, Pablo Casaseca-De-La-Higuera, Xinheng Wang, KeshavDahal, Cheng Jin and Peng Ren |
19 |
Localization techniques in Wireless Sensor Networks (Paper Id: 95) |
Sonia Shahzadi, Muddesar Iqbal and Xinheng Wang |
20 |
Performance Analysis of Spatial and Transform Filters for Efficient Image Noise Reduction (Paper Id: 13) |
Ajay Kumar Shrestha, Santosh Paudel, Pradip Singh Maharjan and RameshwarRijal |
21 |
Communication related issues in GSD: An Exploratory study (Paper Id: 67) |
Mohd Shameem, Chiranjeev Kumar and Bibhas Chandra |
22 |
The Effect of the Time Unit on Software Development Effort Estimates |
Magne Jørgensen
|
23 |
Effort Estimation Practices in Software Companies in Nepal (Paper Id: 61) |
Ritesh Man Tamrakar |
24 |
Analytical Study of Aspect Oriented Programming in Java (Paper Id: 6) |
Rabindra Bista, Loojah Bajracharya, Deeyoranjan Dongol,Purushottam Kharel |
25 |
R. Poudel , S. Bhandari, S. Pathak and R.K. Maskey |
|
26 |
Collaborative Crosschecking System of Observed Loss Estimation for Disaster Relief Management (Paper Id: 99) |
Sirinrat Khwanpheng, Roungsan Chaisricharoen, Punnarumol Temdee and M.A. Hossian |
27 |
Scheduling Algorithms of WirelessMesh Networks For Applications In Disaster Management: A Survey (Paper Id: 24) |
Samia Razzaq, Muddesar Iqbal, Sara Sarwar Mir and Xingheng Wang |
28 |
Reliability Constrained Smart Home Management with Renewable Energy (Paper Id: 44) |
Ryan Jansen and Rajesh Karki |
29 |
Improved Active Power Sharing Strategy for ELC Controlled Synchronous Generator Based Islanded Micro Grid Application (Paper Id: 46) |
Bikram Poudel and Netra Gyawali |
30 |
Control of PMSG Based Wind Turbines For Renewables Based DC Distribution (Paper Id: 55) |
Hari Prasad Rimal, Morris Brenna, Nava Raj Karki and Ajit Kumar Verma |
31 |
A Regression Analysis into Nepali ICT’s Energy Consumption and its Implications (Paper Id: 27) |
Nischal Regmi and Shailesh Pandey |
32 |
Detection of Phishing Emails using Data Mining Algorithms (Paper Id: 101) |
Sami Smadi, Nauman Aslam, Li Zhang, RafeAlasem and Alamgir Hossain |
33 |
Color Image Steganography Technique Using Daubechies Discrete Wavelet Transform (Paper Id: 48) |
Ajaya Shrestha and Arun Timalsina |
34 |
Enhancing knowledge management practices among employees through high quality leader member exchange, mediating role of employee job satisfaction, and retention (Paper Id: 121) |
Saqib Shamim, S. Cang and H. Yu
|
35 |
Cloud Technology in Higher Education: A Review (Paper Id: 57) |
Amrita Rai and Manoj Shakya |
36 |
Use of ICT in Classrooms in Nepal; A study of Student-Centered Learning using ICT (Paper Id: 107) |
Pramesh Vaidya, Sixit Bhatta, Ayush Subedi and David Kansakar |
37 |
Managing the Knowledge for Chinese Tourists: the Destination of Thailand (Paper Id: 122) |
Fu Jing, Mou Lei and Li Ping
|
38 |
Assessing Job Positions of Software Engineering Field from Personality Traits (Paper Id: 40) |
Vipaporn Chaiwon, Chartchai Doungsa-Ard and Tisinee Surapunt |
39 |
Communication, cooperation and knowledge management for the design and operation of innovative logistics clusters (Paper Id: 87) |
Hans-Dietrich Haasis and Irina Dovbischuk
|
40 |
Preserving Privacy in Social Network Graph with KanonymizeDegreeSequenceGeneration (Paper Id: 38) |
Munmun Bhattacharya and Papri Mani (Presented By: Samiran Chattopadhyay) |
41 |
A DBMS Based Inventory Model and its Timeframe Study in Automobile Spare Parts Import Management (Paper Id: 116) |
Prem Lal Tamang and Pradip Kumar Paudyal |
42 |
A Holistic Simulation Model for Remote Patient Monitoring Systems Using Wireless Body Area Sensor Networks (WBASNs) (Paper Id: 120) |
Muhammad Sajjad Akbar, Hongian Yu and ShuangCang
|
43 |
Load Balancing in High Traffic Web Server in Cloud (Paper Id: 56) |
Sameer Tamrakar, Anand Singh and Manoj Shakya |
44 |
Performance Analysis of Various Optimization Techniques for Elliptic Curve Cryptosystems on Resource-Constrained Devices (Paper Id: 49) |
Jagdish Bhatta and Lok Prakash Pandey |
Skype Presentation
SN |
Paper |
Author |
Remarks |
45 |
A Bidding System For Star Craft II Planning Agents (Paper Id: 91) |
Andreas Stiegler, KeshavDahal and Daniel Livingstone |
|
Note: The author’s name in bold presented the paper.