default search action
ICISA 2018: Hong Kong, China
- Kuinam J. Kim, Nakhoon Baek:
Information Science and Applications 2018 - ICISA 2018, Hong Kong, China, June 25-27th, 2018. Lecture Notes in Electrical Engineering 514, Springer 2019, ISBN 978-981-13-1055-3
Ubiquitous Computing
- Afizan Azman, Sumendra Yogarayan, Samuel Leong Wei Jian, Siti Fatimah Abdul Razak, Kirbana Jai Raman, Mohd Fikri Azli Abdullah, Siti Zainab Ibrahim, Anang Hudaya Muhamad Amin, Kalaiarasi Sonai Muthu:
A Study of Wireless Communication Technologies for Vehicular Communication. 3-13 - Jinhyuck Kim, Hyun Jin Kim:
A New Fractional Binary-to-Decimal Number Conversion for Errorless Calculation. 15-21 - Yun-Hong Noh, Ji-Yun Seo, Do-Un Jeong:
Development of Distraction Limit Estimation Index Using Posture Change Monitoring System. 23-29 - Ji-Yun Seo, Yun-Hong Noh, Do-Un Jeong:
Implementation of Rehabilitation Assistant System Based on Movement and Muscle Activity Information. 31-37
Networks and Information Systems
- Zhiqiang Zou, Junjie Xiong, Xu He, Haihong Dai:
NUPT ST-Data Miner: An Spatio-Temporal Data Analysis and Visualization System. 41-51 - Feng-Hsiag Hsiao, Po-Han Lin:
Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based Approach. 53-66 - Patrick Von Angelo V. Atienza, William Emmanuel S. Yu:
A Framework for Performance Analysis of Various Load Balancing Techniques in a Software-Defined Networking Environment. 67-74 - Fauqia Ilyas, Farooque Azam, Wasi Haider Butt, Kinza Zahra:
Inferring Social Relationships Through Network: A Systematic Literature Review. 75-87 - Hyuncheol Kim:
Extended Flow Detection Scheme Using Simple Processor Trace (PT). 89-95 - Kyungock Yi, Hyeonjung Oh:
The Effect of Wearing the Customized Insole on the Coordination of the Right and Left Wrists Measured by Wearables During Golf Swing. 97-108 - SeungAe Kang:
A Study on Development of Application for Management of Obesity in Children with Intellectual Disabilities. 109-114 - Minkyu Kim, Soojung Park, ByoungKwon Park:
A New Paradigm for Spectator Sports in Application of Media. 115-121 - Sunyoung Kang, Seungae Kang:
Physical Activity Intervention Platform for the Elderly with Mild Cognitive Impairment. 123-128
Multimedia and Visualization
- Nakhoon Baek:
A Simplified Emulation Scheme for OpenGL SC 2.0 Rendering over OpenGL Embedded Systems 2.0. 131-135 - Kyusik Park:
Robust Sound Localization Algorithm for Intelligent Acoustic Surveillance System. 137-147 - Yongseok Chi:
A Multiple Optical Vision System of Virtual Display. 149-155 - Afizan Azman, Kirbana Jai Raman, Imran Artwel Junior Mhlanga, Siti Zainab Ibrahim, Sumendra Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, Anang Hudaya Muhamad Amin, Kalaiarasi Sonai Muthu:
Real Time Driver Anger Detection. 157-167 - Woo Suk Shin, Nakhoon Baek:
Debug Output Features for OpenGL SC 2.0 Safety Critical Profile. 169-173 - Zibusiso Bhango, Dustin van der Haar:
Eigennose: Assessing Nose-Based Principal Component Analysis for Achieving Access Control with Occluded Faces. 175-183
Middleware and Operating Systems
- Cheol-Hong Moon:
Implementation of a Monitoring System for the Measurement of Temperature, Flow Rate, and Fluid Pressure of Cooling Systems. 187-197
Security and Privacy
- Kudzaishe Mhou, Dustin van der Haar:
A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems. 201-209 - Mohd Fadzil Abdul Kadir, Mohamad Afendee Mohamed, R. Mohamad, M. Mamat, Abdullah Muhammed:
Performance Comparison of Some Addition Chain Methods Based on Integer Family. 211-218 - Kennedy Okokpujie, Etinosa Noma-Osaghae, Olatunji Okesola, Osemwegie Omoruyi, Chinonso Okereke, Samuel John, Imhade P. Okokpujie:
Integration of Iris Biometrics in Automated Teller Machines for Enhanced User Authentication. 219-228 - Kennedy Okokpujie, Etinosa Noma-Osaghae, Olatunji Okesola, Osemwegie Omoruyi, Chinonso Okereke, Samuel John, Imhade P. Okokpujie:
Fingerprint Biometric Authentication Based Point of Sale Terminal. 229-237 - Imano Williams, Xiaohong Yuan:
A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns. 239-249 - Tao Feng, Xiaoyu Yin, Chunyan Liu:
An Efficient and Anonymous KP-ABE Scheme with Keyword Search. 251-258 - Norman Wilde, Lauren Jones, Robert Lopez, Travis Vaughn:
A DNS RPZ Firewall and Current American DNS Practice. 259-265 - Kwangjun Kim, Manhee Lee:
SNMP-Based Detection of VLAN Hopping Attack Risk. 267-272 - Nikhil Mewalal, Wai Sze Leung:
Improving Hidden Message Extraction Using LSB Steganalysis Techniques. 273-284 - Hsin-Ying Liang, Cheng-Ying Yang, Min-Shiang Hwang:
Secrecy Analysis in the AF Mode Cooperative Communication System. 285-293 - Min-Shiang Hwang, Hung-Wei Yang, Cheng-Ying Yang:
An Improved Hou-Wang's User Authentication Scheme. 295-301 - Anton Miguel Suba, Kurt Vincent Bautista, Julio Carlos Tomas Ledesma, William Emmanuel Yu:
Developing a Testing Framework for Intrusion Detection Algorithms Using Software Defined Networking. 303-313
Data Mining and Artificial Intelligence
- Margaux Fourie, Dustin van der Haar:
Ballet Pose Recognition: A Bag-of-Words Support Vector Machine Model for the Dance Training Environment. 317-325 - Jihyun Byun, Dustin van der Haar:
Pronunciation Detection for Foreign Language Learning Using MFCC and SVM. 327-335 - Angela Siew-Hoong Lee, Ka Leong Daniel Chong, Nicholas Khin-Whai Chan:
OpinionSeer: Text Visualization on Hotel Customer Reviews of Services and Physical Environment. 337-349 - Tevin Moodley, Dustin van der Haar:
Comparisons in Drinking Water Systems Using K-Means and A-Priori to Find Pathogenic Bacteria Genera. 351-359 - Jongmun Jeong, Larsson Bajracharya, Mintae Hwang:
Optimal Lightweight Cryptography Algorithm for Environmental Monitoring Service Based on IoT. 361-367 - Matthias Becker, Sinan Balci:
Improving an Evolutionary Approach to Sudoku Puzzles by Intermediate Optimization of the Population. 369-375 - Martin Kotyrba, Eva Volná, Jakub Gaj:
Saturated Flow Method for Traffic Optimization in Ostrava City. 377-387 - Jan Konvicka, Martin Kotyrba, Eva Volná, Hashim Habiballa, Vladimír Bradác:
Adaptive Control of EV3 Robot Using Mobile Devices and Fuzzy Logic. 389-399 - Ying Shen, Qiang Zhang, Jin Zhang, Jiyue Huang, Yuming Lu, Kai Lei:
Improving Medical Short Text Classification with Semantic Expansion Using Word-Cluster Embedding. 401-411 - Juntian Lin, Guan Luo, Zhu Zhan, Xiaoyao Guan:
A Deep Learning Approach to Mining the Relationship of Depression Symptoms and Treatments for Prediction and Recommendation. 413-422 - Euihyun Jung:
A Bayesian Network Approach for Discovering Variables Affecting Youth Depression. 423-430 - Xu Yang, Zheqi Zhang, Laurie G. Cuthbert, Yapeng Wang:
Forecasting Macao GDP Using Different Artificial Neural Networks. 431-442 - Nutthisara Choolikhit, Wararat Songpan, Monlica Wattana, Ngamnij Arch-int:
Edge Detection and Symmetry Method for Cleft Lip and Palate Children Using Image Processing. 443-455 - Hung Nguyen Ngoc, Jaeyoung Kim, Jong-Myon Kim:
An Effective Envelope Analysis Using Gaussian Windows for Evaluation of Fault Severity in Bearing. 457-464 - Shuting Guo, Zheng Liu, Wenyan Chen, Tao Li:
Event Extraction from Streaming System Logs. 465-474 - Fokrul Alom Mazarbhuiya, Mohammed Yahya Alzahrani, Lilia Georgieva:
Anomaly Detection Using Agglomerative Hierarchical Clustering Algorithm. 475-484 - Kinza Zahra, Farooque Azam, Wasi Haider Butt, Fauqia Ilyas:
User Identification on Social Networks Through Text Mining Techniques: A Systematic Literature Review. 485-498 - Timothy Callemein, Kristof Van Beeck, Geert Brône, Toon Goedemé:
Automated Analysis of Eye-Tracker-Based Human-Human Interaction Studies. 499-509
Software Engineering
- Tomás Cerný, Michael Jeff Donahoo:
Survey on Compromise-Defensive System Design. 513-521 - Larsson Bajracharya, Tirta Mulya, Ayi Purbasari, Mintae Hwang:
A Study on Cost-Effective and Eco-friendly Bicycle Sharing System for Developing Countries. 523-531 - Zhiyi Ma, Jinyang Liu, Xiao He:
An Approach to Modeling Microservice Solutions. 533-542 - Bilal Maqbool, Farooque Azam, Muhammad Waseem Anwar, Wasi Haider Butt, Jahan Zeb, Iqra Zafar, Aiman Khan Nazir, Zuneera Umair:
A Comprehensive Investigation of BPMN Models Generation from Textual Requirements - Techniques, Tools and Trends. 543-557 - Khaled Hamdan, Boumediene Belkhouche, Peter Smith:
A Culture-Based Profile Model of Software Evaluators. 559-570 - Kitti Kredpattanakul, Yachai Limpiyakorn:
Transforming JavaScript-Based Web Application to Cross-Platform Desktop with Electron. 571-579 - Jirí Sebek, Petr Vondrus, Tomás Cerný:
Degree of Similarity of Root Trees. 581-591
Web Technology
- Seung-Mo Je, Jun-Ho Huh:
Nash Equilibrium Solution for Communication in Strategic Competition Adopted by Zigbee Network for Micro Grid. 595-606 - L. G. Pee:
Affordances for the Sharing of Domain-Specific Knowledge on Enterprise Social Media. 607-613
Internet of Things
- Seung Ho Kim, Han Guk Ryu, Chang Soon Kang:
Development of an IoT-Based Construction Site Safety Management System. 617-624 - Miroslav Bures, Tomás Cerný, Bestoun S. Ahmed:
Internet of Things: Current Challenges in the Quality Assurance and Testing Methods. 625-634 - Michal Trnka, Filip Rysavy, Tomás Cerný, Nathaniel Stickney:
Using Wi-Fi Enabled Internet of Things Devices for Context-Aware Authentication. 635-642 - Chayoung Kim, Hye-young Kim:
A Hybrid Deep Q-Network for the SVM Lagrangian. 643-651 - Chayoung Kim, Jung-Min Park, Hye-young Kim:
An Actor-Critic Algorithm for SVM Hyperparameters. 653-661 - Jin-uk Jung, A. M. Ilham, Mintae Hwang, Kyo-Hong Jin:
Design of the Manufacturing Facility Maintenance Systems Based on Internet of Things. 663-673 - Endah Kristiani, Chao-Tung Yang, Yuan-Ting Wang, Chin-Yin Huang:
Implementation of an Edge Computing Architecture Using OpenStack and Kubernetes. 675-685 - Lei Hang, Do Hyeun Kim:
Enabling Cross-Domain IoT Interoperability Based on Open Framework. 687-691
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.