default search action
ICISA 2017: Macau, China
- Kuinam Kim, Nikolai Joukov:
Information Science and Applications 2017 - ICISA 2017, Macau, China, 20-23 March 2017. Lecture Notes in Electrical Engineering 424, Springer 2017, ISBN 978-981-10-4153-2
Ubiquitous Computing
- Yapeng Wang, Xu Yang, Laurie G. Cuthbert, Tiankui Zhang, Lin Xiao:
Improving Performance and Energy Efficiency for OFDMA Systems Using Adaptive Antennas and CoMP. 3-11 - Priti Jagwani, Saroj Kaushik:
Privacy in Location Based Services: Protection Strategies, Attack Models and Open Challenges. 12-21 - Zhengyu Ma, Quansheng Guan, Fei Ji, Hua Yu, Fangjiong Chen:
An Efficient and Low-Signaling Opportunistic Routing for Underwater Acoustic Sensor Networks. 22-29 - Dang-Nhac Lu, Thi-Thu-Trang Ngo, Duc-Nhan Nguyen, Thi-Hau Nguyen, Ha-Nam Nguyen:
A Novel Mobile Online Vehicle Status Awareness Method Using Smartphone Sensors. 30-37 - Young-hwan Ham, Hyo-taeg Jung, Hyuncheol Kim, Jinwook Chung:
A Study on OPNET State Machine Model Based IoT Network Layer Test. 38-45 - Xiaofeng Xu, Guangyuan Wang, Yongji Ren, Xiaolei Liu:
A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks. 46-49
Networks and Information Systems
- Garam Lee, Hyunjin Lee, Kyung-Ah Sohn:
Generating Time Series Simulation Dataset Derived from Dynamic Time-Varying Bayesian Network. 53-60 - Nam-Uk Kim, Tai-Myoung Chung:
AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure Network. 61-68 - Chai Yit Sheng, Phang Keat Keong:
Beyond Map-Reduce: LATNODE - A New Programming Paradigm for Big Data Systems. 69-75 - Matthias Becker:
Indoor Positioning Solely Based on User's Sight. 76-83 - Abed Alshreef, Lin Li, Wahid Rajeh:
Naming Convention Scheme for Role Based Access Control in Cloud Based ERP Platforms. 84-93
Multimedia and Visualization
- Minju Son, Gyeongjae Gwon, Jaeyeong Choi:
Korean/Chinese Web-Based Font Editor Based on METAFONT for User Interaction. 97-104 - Md. Anwar Hussain, Popi Bora, Joyatri Bora:
A Highly Robust and Secure Digital Image Encryption Technique. 105-113 - Rehan Mehmood Yousaf, Saad Rehman, Hassan Dawood, Ping Guo, Zahid Mehmood, Shoaib Azam, Abdullah Aman Khan:
Saliency Based Object Detection and Enhancements in Static Images. 114-123 - Mengqin Li, Xiaopin Zhong:
A Center Symmetric Padding Method for Image Filtering. 124-130 - Cheolhwan Kim, Jiyoung Yoon, Yun-Jung Lee, Shihyun Ahn, Yongtaek Park:
Implementing a Stereo Image Processing for Medical 3D Microscopes with Wireless HMD. 131-138 - Nakhoon Baek:
Design of OpenGL SC 2.0 Rendering Pipeline. 139-144 - Xiao Lin, Zhixun Yan, Linhua Jiang:
Saliency Detection via Foreground and Background Seeds. 145-154 - Guiyang Yue, Zhihao Yu, Cong Liu, Hui Huang, Yiming Zhu, Linhua Jiang:
Identification and Annotation of Hidden Object in Human Terahertz Image. 155-163 - Jongmun Jeong, Seungho Kim, Changsoon Kang, Mintae Hwang:
Information Visualization for Mobile-Based Disability Test Applications. 164-170 - Xingguo Zhang, Guoyue Chen, Kazuki Saruta, Yuki Terata:
Deep Convolutional Neural Networks for All-Day Pedestrian Detection. 171-178 - Kelwin Seen Tiong Tan, Yunli Lee:
An Augmented Reality Learning System for Programming Concepts. 179-187
Middleware and Operating Systems
- SooKyung Lee, Minho Bae, Junho Eum, Sangyoon Oh:
Efficient vCore Based Container Deployment Algorithm for Improving Heterogeneous Hadoop YARN Performance. 191-201 - Yuji Tamura, Doan Truong Thi, Takahiro Chiba, Myungryun Yoo, Takanori Yokoyama:
A Real-Time Operating System Supporting Distributed Shared Memory for Embedded Control Systems. 202-210
Security and Privacy
- Gibeom Song, Manhee Lee:
MBR Image Automation Analysis Techniques Utilizing Emulab. 213-220 - Van Thuan Do, Paal Engelstad, Boning Feng, Thanh Van Do:
Detection of DNS Tunneling in Mobile Networks Using Machine Learning. 221-230 - Chuah Chai Wen, Mustafa Mat Deris, Edward Dawson:
On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function. 231-240 - Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang:
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment. 241-248 - Poonam Jindal, Rupali Sinha:
Physical Layer Security with Energy Harvesting in Single Hop Wireless Relaying System. 249-256 - Pongsak Sirisom, Janjira Payakpate, Winai Wongthai:
A System Design for the Measurement and Evaluation of the Communications Security Domain in ISO 27001: 2013 Using an Ontology. 257-265 - Chuah Chai Wen, Wen Wen Koh:
Timing Side Channel Attack on Key Derivation Functions. 266-273 - Hang Zhang, Xi Wang, Dieter Hogrefe:
A Security Aware Fuzzy Embedded ACO Based Routing Protocol (SAFACO) in VANETs. 274-281 - Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen:
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System". 282-289 - Hoang Tuan Ly, Cam Nguyen Tan, Van-Hau Pham:
eDSDroid: A Hybrid Approach for Information Leak Detection in Android. 290-297 - Nguyen Tan Cam, Van-Hau Pham, Tuan A. Nguyen:
Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis. 298-305 - Kin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan:
Known Bid Attack on an Electronic Sealed-Bid Auction Scheme. 306-314 - Jeongho Son, Dongkyu Kim, Hak-Yeol Choi, Han-Ul Jang, Sunghee Choi:
Perceptual 3D Watermarking Using Mesh Saliency. 315-322 - Sang-Keun Ji, Ji-Hyeon Kang, Heung-Kyu Lee:
Perceptual Watermarking for Stereoscopic 3D Image Based on Visual Discomfort. 323-330 - Han-Ul Jang, Hak-Yeol Choi, Dongkyu Kim, Jeongho Son, Heung-Kyu Lee:
Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks. 331-338 - Hak-Yeol Choi, Han-Ul Jang, Jeongho Son, Dongkyu Kim, Heung-Kyu Lee:
Content Recapture Detection Based on Convolutional Neural Networks. 339-346 - Mohsen Mohamad Hata, Fakariah Hani Mohd Ali, Syed Ahmad Aljunid:
Secret Sharing Deniable Encryption Technique. 347-357 - Dongkyu Kim, Han-Ul Jang, Hak-Yeol Choi, Jeongho Son, In-Jae Yu, Heung-Kyu Lee:
Improved 3D Mesh Steganalysis Using Homogeneous Kernel Map. 358-365 - Kin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan:
From Sealed-Bid Electronic Auction to Electronic Cheque. 366-376 - Connor Røset, Van Warren, Chia-Chu Chiang:
Enhanced Database Security Using Homomorphic Encryption. 377-387 - Jaewoo Park, Hyoungshick Kim:
k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF Files. 388-395 - Xingmin Cui, Ruiyi He, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Eric Ke Wang:
Reconstruction of Task Lists from Android Applications. 396-403 - Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang:
Design and Evaluation of Chaotic Iterations Based Keyed Hash Function. 404-414
Data Mining and Artificial Intelligence
- Buhm Lee, Dohee Sohn, Kyoung Min Kim:
Intellectual Overall Evaluation of Power Quality Including System Cost. 417-425 - Euihyun Jung:
A Data-Driven Decision Making with Big Data Analysis on DNS Log. 426-432 - Pedro Morgado, Henrique Vicente, António Abelha, José Machado, João Neves, José Neves:
A Case-Based Approach to Colorectal Cancer Detection. 433-442 - Lijuan Cui, Changjian Wang, Wanli Li, Ludan Tan, Yuxing Peng:
Multi-Modes Cascade SVMs: Fast Support Vector Machines in Distributed System. 443-450 - Juntao Liu, Caihua Wu:
Deep Learning Based Recommendation: A Survey. 451-458 - Sanja Lazarova-Molnar, Nader Mohamed:
Towards Collaborative Data Analytics for Smart Buildings. 459-466 - Nurul Amelina Nasharuddin, Muhamad Taufik Abdullah, Azreen Azman, Rabiah Abdul Kadir:
English and Malay Cross-lingual Sentiment Lexicon Acquisition and Analysis. 467-475 - Mudassar Adeel Ahmed, Wasi Haider Butt, Imran Ahsan, Muhammad Waseem Anwar, Muhammad Latif, Farooque Azam:
A Novel Natural Language Processing (NLP) Approach to Automatically Generate Conceptual Class Model from Initial Software Requirements. 476-484 - Farhana Nazir, Wasi Haider Butt, Muhammad Waseem Anwar, Muazzam Ali Khan Khattak:
The Applications of Natural Language Processing (NLP) for Software Requirement Engineering - A Systematic Literature Review. 485-493 - Jane You, Qin Li, Zhenhua Guo, Ruohan Zhao:
Smart Fetal Monitoring. 494-503 - Yi-Horng Lai, Chih-Chiang Ho, Piao-Yi Chiou:
A Network-Based Approach on Big Data for the Comorbidities of Urticaria. 504-511 - Maciej Janowicz, Luiza Ochnio, Leszek J. Chmielewski, Arkadiusz Orlowski:
Application of Automated Theorem-Proving to Philosophical Thought: Spinoza's Ethics. 512-518 - Cong Viet-Ngu Huynh, Jongmin Kim, Jun-Ho Huh:
Improving the B+-Tree Construction for Transaction Log Data in Bank System Using Hadoop. 519-525 - Haofang Lu, Ying Zhou, Zi-Ke Zhang:
Calculate Deep Convolution NeurAl Network on Cell Unit. 526-532 - Godai Azuma, Daisuke Kitakoshi, Masato Suzuki:
Stepwise Structure Learning Using Probabilistic Pruning for Bayesian Networks: Improving Efficiency and Comparing Characteristics. 533-543 - Lin Ma, Xiao Lin, Linhua Jiang:
Differential-Weighted Global Optimum of BP Neural Network on Image Classification. 544-552 - Nontachai Danpakdee, Wararat Songpan:
Classification Model for Skin Lesion Image. 553-561
Software Engineering
- Junko Shirogane:
Generation of Use Cases for Requirements Elicitation by Stakeholders. 565-576 - Naseem Ibrahim, Ismail I. K. Al Ani:
Smart Learner-Centric Learning Systems. 577-584 - Miroslav Bures, Tomás Cerný, Matej Klima:
Prioritized Process Test: More Efficiency in Testing of Business Processes and Workflows. 585-593 - Miroslav Bures, Tomás Cerný:
Static Testing Using Different Types of CRUD Matrices. 594-602 - Woo Sung Jang, Bo Kyung Park, Hyun Seung Son, Byung Kook Jeon, Robert Young Chul Kim:
Extracting Test Cases with Message-Sequence Diagram for Validating the Photovoltaic Energy Integrated Monitoring System. 603-608 - Bo Kyung Park, Woo Sung Jang, Hyun Seung Son, Keunsang Yi, Robert Young Chul Kim:
Automatic Test Case Generation with State Diagram for Validating the Solar Integrated System. 609-614 - Johanna Ahmad, Salmi Baharom:
Comparison of Software Complexity Metrics in Measuring the Complexity of Event Sequences. 615-624 - Chao-Tung Yang, Cai-Jin Chen, Tzu-Yang Chen:
Implementation of Ceph Storage with Big Data for Performance Comparison. 625-633
Web Technology
- Natthaphong Phuntusil, Yachai Limpiyakorn:
Predicting Engaging Content for Increasing Organic Reach on Facebook. 637-644 - Cheng-Ying Yang, Tsai-Yuan Chung, Min-Shiang Hwang, Cheng-Yi Li, Jenq-Foung J. F. Yao:
Learning Performance Evaluation in eLearning with the Web-Based Assessment. 645-651 - Sithira Vadivel, Insu Song, Abhishek Singh Bhati:
Improving Teaching and Learning in Southeast Asian Secondary Schools with the Use of Culturally Motivated Web and Mobile Technology. 652-659 - Bah Tee Eng:
Game-Based Learning to Teach Assertive Communication ClickTalk for Enhancing Team Play. 660-667 - Rene Ivan Heinsen, Cindy Pamela Lopez, Tri D. T. Nguyen, Eui-Nam Huh:
Cloud Storage Federation as a Service Reference Architecture. 668-675
Internet of Things
- Kyung-Gyun Lim, Chang-Geun Kim:
A Study on the IoT Framework Design for Ginseng Cultivation. 679-687 - Jacqueline Lee-Fang Ang, Wai-Kong Lee, Boon Yaik Ooi, Thomas Wei Min Ooi:
An IPS Evaluation Framework for Measuring the Effectiveness and Efficiency of Indoor Positioning Solutions. 688-697 - Omar Hiari, Dhiah el Diehn I. Abou-Tair, Ismail Abushaikha:
An IoT-Based Virtual Addressing Framework for Intelligent Delivery Logistics. 698-705 - Michal Trnka, Martin Tomásek, Tomás Cerný:
Context-Aware Security Using Internet of Things Devices. 706-713 - Peerapak Lerdsuwan, Phond Phunchongharn:
An Energy-Efficient Transmission Framework for IoT Monitoring Systems in Precision Agriculture. 714-721 - Nazatul Shiema Moh Nazar, Suresh Thanakodi, Azizi Miskon, Siti Nooraya Mohd Tawil, Muhammad Syafiq Najmi Mazlan:
Piezoelectric Voltage Monitoring System Using Smartphone. 722-731 - Wuttipong Ruanthong, Winai Wongthai, Sutthiwat Panithansuwan:
A System for Classroom Environment Monitoring Using the Internet of Things and Cloud Computing. 732-742
4th Convergence of Healthcare and Information Technology
- Chanjin Park, Wonhyuk Lee, Kuinam J. Kim, Hyuncheol Kim:
Research on Design of End Site Architecture to Connect LHCONE in KREONET. 745-750 - Minkyu Kim, Soojung Park, ByungKwon Park:
A Study of Children Play Educational Environment Based on u-Healthcare System. 751-756 - Hyuncheol Kim:
Virtual Resources Allocation Scheme in ICT Converged Networks. 757-762 - Hyojin Park, Kireem Han, Jinhong Yang, Jun Kyun Choi:
Enhanced Metadata Creation and Utilization for Personalized IPTV Service. 763-769 - Seung Ae Kang:
A Study of Teaching Plan for the Physical Activity Using ICT. 770-776 - Soonchoul Kim, Hyuncheol Kim, Jinwook Chung:
Design and Implementation of Headend Servers for Downloadable CAS. 777-783 - Jun-Ho Huh, Han-Byul Kim, Jin-Mo Kim:
A Method of Modeling of Basic Big Data Analysis for Korean Medical Tourism: A Machine Learning Approach Using Apriori Algorithm. 784-790 - YoungHee Cho, SeungAe Kang, Soohyun Kim, Sunyoung Kang:
The Study of Application Development on Elderly Customized Exercise for Active Aging. 791-798 - Soojung Lee:
Improving Jaccard Index for Measuring Similarity in Collaborative Filtering. 799-806 - Suresh Thanakodi, Nazatul Shiema Moh Nazar, Azizi Miskon, Ahmad Mujahid Ahmad Zaidi, Muhammad Syafiq Najmi Mazlan:
Temperature Recorder System. 807-814
7th International Workshop on ICT Convergence
- Siti Rohajawati, Boy Iskandar Pasaribu, Gun Gun Gumilar, Hilda Rizanti Putri:
The Emergence of ICTs for Knowledge Sharing Based on Research in Indonesia. 817-826 - Dyah Budihastuti, Harjanto Prabowo:
Quality of Transformation of Knowledge as Part of Knowledge Management System - (Research in Private University in Jakarta). 827-833
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.