default search action
IDAACS-SWS 2018, Lviv, Ukraine
- 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), Lviv, Ukraine, September 20-21, 2018. IEEE 2018, ISBN 978-1-5386-9339-1
- Artem Tulenkov, Anzhelika Parkhomenko, Aleksandr Sokolyanskii, Aleksandr Stepanenko, Yaroslav Zalyubovskiy:
The Features of Wireless Technologies Application for Smart House Systems. 1-5 - V. A. Nita, M. Larossa Noguero, R. Slinksc, C. Bruschi, R. Gundacker, Miguel Angel Minarro Martinez, H. Mierzwinski, M. Richard, C. Braune, Thomas Felberbauer:
Smart Sensor Box for Alivemaps Based on NB-IOT. 6-9 - Hui Xu, Yingchun Fu, Ce Fang, Qianqian Cao, Jun Su, Siwei Wei:
An Improved Binary Whale Optimization Algorithm for Feature Selection of Network Intrusion Detection. 10-15 - Hui Xu, Qianqian Cao, Ce Fang, Yingchun Fu, Jun Su, Siwei Wei, Pavlo Bykovyy:
Application of Elephant Herd Optimization Algorithm Based on Levy Flight Strategy in Intrusion Detection. 16-20 - Sergiy Melnyk, Khurshid Alam, Abraham Gebru Tesfay, Hans D. Schotten:
Hybrid MAC for Low Latency Wireless Communication Enabling Industrial HMI Applications. 21-24 - Vladimir Barannik, Mikolaj P. Karpinski, V. V. Tverdokhleb, Dmitry Barannik, Viktoria Himenko, Marek Aleksandcr:
The technology of the video stream intensity controlling based on the bit-planes recombination. 25-28 - Vasyl Lytvyn, Victoria Vysotska, Yevhen Burov, Igor Bobyk, Olha Ohirko:
The Linguometric Approach for Co-authoring Author's Style Definition. 29-34 - Juan Yang, Zhiwei Ye, Lingyu Yan, Wei Gu, Ruoxi Wang:
Modified Naive Bayes Algorithm for Network Intrusion Detection based on Artificial Bee Colony Algorithm. 35-40 - Shuang Sun, Zhiwei Ye, Lingyu Yan, Jun Su, Ruoxi Wang:
Wrapper Feature Selection Based on Lightning Attachment Procedure Optimization and Support Vector Machine for Intrusion Detection. 41-46 - Can Jin, Zhiwei Ye, Chunzhi Wang, Lingyu Yan, Ruoxi Wang:
A Network Intrusion Detection Method Based on Hybrid Rice Optimization Algorithm Improved Fuzzy C-Means. 47-52 - Chunzhi Wang, Pan Wu, Lingyu Yan, Fangyu Zhou, Wencheng Cai:
Image retrieval based on fireworks algorithm optimizing convolutional neural network. 53-56 - Wei Liu, Yongkun Huang, Xinlu Zong, Heng Shi, Zhiwei Ye, Siwei Wei:
Application of lightning search algorithm in localization of Wireless Sensor Networks. 57-61 - Yiheng Sun, Zhiwei Ye, Chunzhi Wang, Lingyu Yan, Ruoxi Wang:
Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Pigeon-inspired Optimization Algorithm. 62-67 - Feng Chen, Zhiwei Ye, Chunzhi Wang, Lingyu Yan, Ruoxi Wang:
A Feature Selection Approach for Network Intrusion Detection Based on Tree-Seed Algorithm and K-Nearest Neighbor. 68-72 - Xu Zhang, Zhiwei Ye, Lingyu Yan, Chunzhi Wang, Ruoxi Wang:
Security Situation Prediction based on Hybrid Rice Optimization Algorithm and Back Propagation Neural Network. 73-77 - Jelena Bleja, Uwe Grossmann, Henrike Langer:
A Collaborative System Business Model for Ambient Assisted Living Systems. 78-81 - Kai-Oliver Detken, Marcel Jahnke, Malte Humann, Bernd Rollgen:
Integrity and Non-repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks. 82-87 - Wei Liu, Shuai Yang, Shuang Sun, Siwei Wei:
A Node Deployment Optimization Method of WSN Based on Ant-Lion Optimization Algorithm. 88-92 - Bohdan Durnyak, Bohdana Havrysh, Oleksandr Tymchenko, Michal Zelyanovsky, Oleksandr O. Tymchenko, Orest Khamula:
Intelligent System for Sensor Wireless Network Access: Modeling Methods of Network Construction. 93-97 - Ivan Burlachenko, Iryna Zhuravska, Yevhen Davydenko, Volodymyr Savinov:
Vulnerabilities Analysis and Defense Based on MAS Method in Fast Dynamic Wireless Networks. 98-102 - Aqsa Naeem, Naveed Ul Hassan, Muhammad Adeel Pasha, Chau Yuen, Axel Sikora:
Performance Analysis of TDOA-based Indoor Positioning Systems using Visible LED Lights. 103-107 - Oleksandr Lcmeshko, Aymen M. K. Al-Dulaimi, Oleksandra Yeremenko, Maryna Yevdokymenko:
Comparative Analysis of Solutions for Management of Time-Frequency Resource in LTE Downlink. 108-111 - Roman Banakh, Andrian Piskozub:
Attackers' Wi-Fi Devices Metadata Interception for their Location Identification. 112-116 - Carsten Wolff, Ala Nuseibah:
Application Enablement Providers in the Internet of Things. 117-124 - Alexander Kuchansky, Andrii Biloshchytskyi, Yurii Andrashko, Vladimir Vatskel, Svitlana Biloshchytska, Olena Danchenko, Igor Vatskel:
Combined Models for Forecasting the Air Pollution Level in Infocommunication Systems for the Environment State Monitoring. 125-130 - Vasyl Yatskiv, Nataliya Yatskiv, Anatoliy Sachenko, Solomiya Yatskiv, Taras Tsavolyk:
Adaptive Data Transmission Protocol for Wireless Sensor Networks Based on Residue Number System Correcting Codes. 131-136 - Leonid V. Moroz, Volodymyr Samotyy, Oleh Horyachyy:
An Effective Floating-Point Reciprocal. 137-141 - Bohdan Shevchuk, Orest Ivakhiv, Mykhaylo Geraimchuk, Roman Velgan:
Adaptive and Secured Transmission of Monitoring Data in Wireless Networks. 142-148 - Xiao Zheng, Zhiwei Ye, Jun Su, Hongwei Chen, Ruoxi Wang:
Network Intrusion Detection Based on Hybrid Rice Algorithm Optimized Extreme Learning Machine. 149-153 - Wei Liu, Yuanyuan Xiong, Xinlu Zong, Wei Siwei:
Trilateration Positioning Optimization Algorithm Based on Minimum Generalization Error. 154-157 - Vitalii Susukailo, Yuriy Lakh:
Access Control System Based on Encryption in QR-Code Technology. 158-161 - Joanna Michalowska, Arkadiusz Tofil, Jerzy Józwik, Jaroslaw Pytka, Piotr Budzynski, Ewa Korzeniewska:
Measurement of high-frequency electromagnetic fields in CNC machine tools area. 162-165 - Hui Xu, Ce Fang, Qianqian Cao, Chaochuan Fu, Lingyu Yan, Siwei Wei:
Application of a Distance-weighted KNN Algorithm Improved by Moth-Flame Optimization in Network Intrusion Detection. 166-170 - Sergei Yelmanov, Yuriy Romanyshyn:
Rapid No-Reference Contrast Assessment for Wireless-based Smart Video Applications. 171-174 - Andreas Walz, Muhammad Haris, Axel Sikora:
Investigating and Optimising the DTLS Handshake over Wireless Links with High Error Rate and Low Data Rate. 175-178 - Jerzy Józwik, Arkadiusz Tofil, Joanna Michalowska, Jaroslaw Pytka, Piotr Budzynski, Ewa Korzeniewska:
Investigation of the Effect of the Measuring Probe Orientation on the Wireless Radio Signal Transmission in Measurements on a CNC Machine Tool. 179-183 - Sergei Yelmanov, Yuriy Romanyshyn:
Image Contrast Enhancement for Smart Cameras in Wireless / Mobile Video Applications. 184-186 - Mykhailo Klymash, Taras Maksymyuk, Stepan Dumych, Oleg Yaremko:
Designing the Industrial and Environmental Monitoring System based on the Internet of Things Architecture. 187-190 - Inna Skarga-Bandurova, Marina Derkach, Igor Kotsiuba:
The Information Service for Delivering Arrival Public Transport Prediction. 191-195 - Zubair Arnjad, Axel Sikora, Benoît Hilt, Jean-Philippe Lauffenburger:
Latency Reduction for Narrowband LTE with Semi-Persistent Scheduling. 196-198 - Piotr Milczarski, Zofia Stawska, Shane Dowdall:
Security Systems with Biometry based on Partial View Facial Images Using Geometrical Features. 204-209 - Mikolaj P. Karpinski, Volodymyr Khoma, Valerii Dudvkevych, Yuriy Khoma, Dmytro Sabodashko:
Autoencoder Neural Networks for Outlier Correction in ECG- Based Biometric Identification. 210-215 - Mykhaylo Palamar, Volodymyr Kruglov, Andrii Chaikovskyi:
Modeling Digital Radio System Secure Connection with Changing the Operating Frequency. 216-220 - Andriy Miskiv, Volodymyr-Myron Miskiv, Ivan Prudyus, Roman Yankevych, Sergiy Fabirovskyy:
Model of the Periodic Autocorrellation Function of Code Binary Sequences for Wireless Noise Imune Data Transmission Systems Signals Synthesis. 221-224 - Oleg Ivanchenko, Vyacheslav Kharchenko, Borys Moroz, Leonid Kabak, Serhii Konovalenko:
Risk Assessment of Critical Energy Infrastructure Considering Physical and Cyber Assets: Methodology and Models. 225-228 - Halyna Beshley, Maryan Kyryk, Mykola Beshley, Oleksiy Panchenko:
Method of Information Flows Engineering and Resource Distribution in 4G/5G Heterogeneous Network for M2M Service Provisioning. 229-233 - Volodymyr Pyliavskyi, Serhii Siden, Olena Osharovska, Katerina Neumytykh:
Adaptation Video Signal to Spectral Distribution of Light Source. 234-237 - Vasyl Yatskiv, Anatoliy Sachenko, Volodymyr Kochan, Oleksandr Osolinsky:
Technique of Green Wave Regulation for Special Purpose Vehicles. 238-240 - Taras Maksymyuk, Juraj Gazda, Oleh Yaremko, Denys Nevinskiy:
Deep Learning Based Massive MIMO Beamforming for 5G Mobile Network. 241-244 - Thaddeus Kochanski, Tomasz Centala, Alexander V. Drozd, Raymond Garbos, Jason Jeffords, Vyacheslav Kharchenko, Andrzej Rucinski, Robert Zanghi, Jerzy Zurek:
Flexible Fractal Network as a Foundation for Enhanced Wellness. 245-250
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.