default search action
ICOIN 2018: Chiang Mai, Thailand
- 2018 International Conference on Information Networking, ICOIN 2018, Chiang Mai, Thailand, January 10-12, 2018. IEEE 2018, ISBN 978-1-5386-2290-2
- Mubbashir Ayub, Mustansar Ali Ghazanfar, Muazzam Maqsood, Asjad Saleem:
A Jaccard base similarity measure to improve performance of CF based recommender systems. 1-6 - Hoon-Keng Poon, Wun-She Yap, Yee-Kai Tee, Bok-Min Goi, Wai-Kong Lee:
Document level polarity classification with attention gated recurrent unit. 7-12 - Jiabin Qu, Xinyu Gu, Lin Zhang:
Improved UGRNN for short-term traffic flow prediction with multi-feature sequence inputs. 13-17 - Hwayoung Choi, Kyung-Jin You, Hyun-Chool Shin:
Multi-finger motion inference using M1 neural decoding. 18-20 - Jeffrey Spaulding, Jeman Park, Joongheon Kim, Aziz Mohaisen:
Proactive detection of algorithmically generated malicious domains. 21-24 - Wasiq Noor Ahmad Qasmi, Taimur Siddiqui, Muhammad Karam Shehzad, Adnan Iqbal, Muhammad Saqib Ilyas:
A comparative study of failover schemes for IaaS recovery. 25-30 - Hamza Hammami, Hanen Brahmi, Sadok Ben Yahia:
Secured outsourcing towards a cloud computing environment based on DNA cryptography. 31-36 - Hamza Hammami, Hanen Brahmi, Sadok Ben Yahia:
Towards a new security approach based on heartbeat authentication to ensure security of cloud data access. 37-43 - Muhammad I. H. Sukmana, Kennedy A. Torkura, Feng Cheng, Christoph Meinel, Hendrik Graupner:
Unified logging system for monitoring multiple cloud storage providers in cloud storage broker. 44-49 - Abdallah Ali Zainelabden Abdallah Ibrahim, Sébastien Varrette, Pascal Bouvry:
PRESENCE: Toward a novel approach for performance evaluation of mobile cloud SaaS Web Services. 50-55 - Duc-Nghia Vu, Nhu-Ngoc Dao, Sungrae Cho:
Downlink sum-rate optimization leveraging hungarian method in fog radio access networks. 56-60 - Minho Han, Sun-Joong Kim:
User scenario based video contents creation system. 61-63 - Sanghoon Lee, Ilhong Shin, Eunjun Rhee, Sunghee Lee, Namkyung Lee:
A transformation analysis of 3D virtual object for projection mapping. 64-66 - Seunghyeon Moon, Sungkwan Jung, Seungyong Jung:
A study on trust factors in a multimedia service environment. 67-69 - Choi Myung Jin, Kim Tae Young, Lee Min Seob, Kim Min Jae:
A study on near-real-time geometric correction system of drones image. 70-72 - Tai-Won Um, Gyu Myoung Lee, Hyun-Woo Lee:
Trustworthiness management in sharing CDN infrastructure. 73-75 - Jun Wook Lee, Yong Woo Kim:
A study on smart IoT hub for intelligent signage services using trust information. 76-79 - Tanaphol Suebchua, Bundit Manaskasemsak, Arnon Rungsawang, Hayato Yamana:
History-enhanced focused website segment crawler. 80-85 - Hideki Kondo, Kazumasa Takami:
Individualized electric power management system using BLE tag at a shared house. 86-91 - Charles Edward A. Robin, Victor M. Romero:
DTNDocs: A delay tolerant peer-to-peer collaborative editing system. 92-97 - Kazuki Uemura, Hiroki Murotsu, Koki Matsumoto, Shingo Nakajima, Tomotaka Wada, Kazuhiro Ohtsuki:
Number ofpeople grasp system of neighboring terminals using Bluetooth low energy. 98-103 - Chun-De Chang, Hui-Tang Lin:
On similarities of string and query sequence for DGA botnet detection. 104-109 - Ray Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, Luís E. T. Rodrigues, Miguel Correia:
Fireplug: Flexible and robust N-version geo-replication of graph databases. 110-115 - Krisada Sangsanit, Werasak Kurutach, Suronapee Phoomvuthisarn:
REST web service composition: A survey of automation and techniques. 116-121 - Masafumi Katoh, Masahiko Murakami, Akiko Yamada, Masaaki Kawai, Motoyoshi Sekiya, Sumie Morita, Makoto Murakami:
Proposal of a personal agent for human centric information networking: Collaboration of human profile and human context. 122-127 - Napaphat Vichaidis, Hiroshi Tsunoda, Glenn Mansfield Keeni:
Analyzing darknet TCP traffic stability at different timescales. 128-133 - Shin Horie, Hiroaki Higaki:
Wake-up schedule modification for shorter-delay intermittent wireless sensor networks. 134-139 - Takahiro Kawasaki, Yumi Takaki, Tomio Kamada, Chikara Ohta:
A study for improvement of throughput in high-density wireless networks using transmitting opportunity control. 140-145 - Gokce Nur Yilmaz:
Depth perception prediction of 3D video QoE for future internet services. 146-149 - Minsu Kim, Kwangsue Chung:
Quality control scheme based on VBR characteristics for improving QoE of UHD streaming service. 150-155 - Daniel Fraunholz, Hans Dieter Schotten:
Strategic defense and attack in deception based network security. 156-161 - Abigail M. Y. Koay, Aaron Chen, Ian Welch, Winston K. G. Seah:
A new multi classifier system using entropy-based features in DDoS attack detection. 162-167 - Trupil Limbasiya, Arijit Karati:
Cryptanalysis and improvement of a mutual user authentication scheme for the Internet of Things. 168-173 - Hamza Hammami, Hanen Brahmi, Sadok Ben Yahia:
Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems. 174-181 - Saad El Jaouhari, Ahmed Bouabdallah, Jean-Marie Bonnin:
A secure WebRTC/WoT-based health-care architecture enhanced with access control. 182-187 - Gaurav Varshney, Sumant Bagade, Shreya Sinha:
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress. 188-193 - Sangmin Lee, Kuyju Kim, Jina Kang, Hyoungshick Kim:
Bypassing DRM protection in e-book applications on Android. 194-198 - Eline Rietberg, Lucia D'Acunto, Robert E. Kooij, Hans van den Berg:
Analyzing information availability in ICN under link failures. 199-204 - Samuel Moreira Abreu Araújo, Fernanda S. H. Souza, Geraldo R. Mateus:
Virtual network embedding in multi-domain environments with energy efficiency concepts. 205-210 - Yusuke Igarashi, Toshiaki Miyazaki:
A DTN routing algorithm adopting the "Community" and "Centrality" parameters used in social networks. 211-216 - N. I. Didenko, D. F. Skripnuk, O. V. Mirolyubova, Viktor Merkulov, V. Sevashkin, Ekaterina Samylovskaya:
System of econometric equations of the world market of natural gas. 217-222 - Yuki Takei, Zhi Liu, Susumu Ishihara:
Effect of channel bonding and parallel data transmission with IEEE802.11n wireless LAN in a small sewer pipe. 223-228 - Hayato Soya, Osamu Takyu, Keiichiro Shirai, Fumihito Sasamori, Shiro Handa, Mai Ohta, Takeo Fujii:
Modified rendezvous scheme with inferring access channel probability of slave by master. 229-234 - Sumika Nishikawa, Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
Analysis of message delivery delay in large-scale geographic DTN routing. 235-240 - Natasa Zivic, Christoph Ruland:
Cognition for enhanced biometrie authentication. 241-244 - Nhu-Ngoc Dao, Duc-Nghia Vu, Yunseong Lee, Minho Park, Sungrae Cho:
MAEC-X: DDoS prevention leveraging multi-access edge computing. 245-248 - Tran Manh Nam, Phan Hai Phong, Tran Dinh Khoa, Truong Thu Huong, Pham Ngoc Nam, Huu-Thanh Nguyen, Luong Xuan Thang, Pham Anh Tuan, Le Quang Dung, Vu Duy Loi:
Self-organizing map-based approaches in DDoS flooding detection using SDN. 249-254 - Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:
A method for estimating process maliciousness with Seq2Seq model. 255-260 - Lingyan Xiu, Bojiao Ma, Konglin Zhu, Lin Zhang:
Implementation and optimization of image acquisition with smartphones in computer vision. 261-266 - Oleg A. Kozlov, Dmitriy G. Rodionov, Liudmilaa A. Guzikova:
Information security problems in educational institutions in conditions of network interaction. 267-269 - Muhui Yang, Yihua Huang:
OVS-DPDK with TSO feature running under docker. 270-273 - Chung-Ming Huang, Meng-Shu Chiang, Wei-Long Su, Duy-Tuan Dao:
SDN-based V2V offloading for cellular network using the LifeTime-based network state routing (LT-NSR). 274-279 - Ashutosh Bhatia, K. Haribabu, Kartikeya Gupta, Aakash Sahu:
Realization of flexible and scalable VANETs through SDN and virtualization. 280-282 - Yueping Cai, Jun Liu, Xinwei Fan, Ya Qiu, Bing Tan:
Software defined status aware routing in content-centric networking. 283-288 - Tri-Hai Nguyen, Trinh Nguyen, Myungsik Yoo:
Analysis of deployment approaches for virtual customer premises equipment. 289-291 - Bala Prakasa Rao Killi, Seela Veerabhadreswara Rao:
Link failure aware capacitated controller placement in software defined networks. 292-297 - Yutaka Onuma, Yoshiaki Terashima, Sumika Nakamura, Ryozo Kiyohara:
A method of ECU software updating. 298-303 - Tatsuro Hara, Ryozo Kiyohara:
Vehicle approaching model for T-junction during transition to autonomous vehicles. 304-309 - Shunsuke Tsurumi, Takeo Fujii:
Reliable vehicle-to-vehicle communication using spectrum environment map. 310-315 - Harsha Vasudev, Debasis Das:
A trust based secure communication for software defined VANETs. 316-321 - Hesham El-Sayed, Moumena Chaqfeh:
The deployment of mobile edges in vehicular environments. 322-324 - Shan Wu, Kai Liu, Wenzhu Zhang, Zhen Xu, Feng Liu, Xiling Luo:
A distributed cooperative MAC protocol with relay collision avoidance for wireless ad hoc networks. 325-330 - Norihiro Naganuma, Kai Osawa, Jun Mashino, Satoshi Suyama, Hiroyuki Otsuka:
Proposal of CQI table switching control method corresponding to 256-QAM for CRE in HetNet. 331-335 - Danish Mehmood Mughal, Syed Tariq Shah, Daniyal Munir, Kwang Hyun Park, Min Young Chung:
Throughput analysis of multi-antenna based SWIPT relay network. 336-340 - Devarani Devarani Devim, Seokjoo Shin:
Outage probability analysis of device-to-device communications with frequency reuse-2 in fractional frequency reuse method. 341-345 - Yi Gong, Shengchu Wang, Yupeng Zhang, Feng Luo, Lin Zhang:
Exploring LTE-V link level performance by geometry enhanced winner II channel model. 346-351 - Ruxiao Tian, Tomoki Ota, Hiroyuki Otsuka:
Influence of phase error on OFDM-based 4096-QAM with turbo coding. 352-355 - Ameha T. Abebe, Chung Gu Kang:
FTN-based MIMO transmission for efficient coexistence of broadband and sporadic traffics. 356-358 - Jae Won Lee, Chung Gu Kang, Minjoong Rim:
SINR-ordered cross link interference control scheme for dynamic TDD in 5G system. 359-361 - Akira Kishida, Yoshifumi Morihiro, Takahiro Asai, Yukihiko Okumura:
Cell selection scheme for handover reduction based on moving direction and velocity of UEs for 5G multi-layered radio access networks. 362-367 - Abhishek Joshi, Sarang Dhongdi, Ankit, K. R. Anupama:
Joint clustering and routing protocol for static 3D wireless sensor networks. 368-373 - Jussi Turkka, Olivia, Myleen Dosado Villaluz, Simon Foo:
Optimization of LTE uplink performance in multivendor heterogeneous networks. 374-379 - Anupam Kumar Bairagi, Nguyen Hoang Tran, Choong Seon Hong:
A multi-game approach for effective co-existence in unlicensed spectrum between LTE-U system and Wi-Fi access point. 380-385 - Nasim Ravi, Aysegül Yayimli:
Fair slot assignment in elastic optical networks under dynamic traffic. 386-390 - Debasis Das:
Secure cloud computing algorithm using homomorphic encryption and multi-party computation. 391-396 - Luc Tidy, Steve Woodhead:
The effect of datagram size and susceptible population on the epidemiology of fast self-propagating malware. 397-401 - Rongfei Wan, Bin Da, Richard Li, Chuang Wang, Hongpei Li:
Identity based security for authentication and mobility in future ID oriented networks. 402-407 - Balazs Voneki:
Intelligent sensor network for fence protection. 408-413 - Sabah Suhail, Choong Seon Hong, M. Ali Lodhi, Faheem Zafar, Abid Khan, Faisal Bashir Hussain:
Data trustworthiness in IoT. 414-419 - Ganesh Bellikar, Ashutosh Bhatia, R. C. Hansdah, Sudhanshu Singh:
3TAAV: A three-tier architecture for pseudonym-based anonymous authentication in VANETs. 420-425 - Dongjune Lee, Jaesung Lim, Hoki Baek:
An airborne communication relay scheme for IEEE 802.11 WLAN based network. 426-431 - Jongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song, Dongho Won:
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. 432-437 - Chunyi Quan, Jaewook Jung, Hakjun Lee, Dongwoo Kang, Dongho Won:
Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme. 438-441 - Shashi Raj Pandey, Choong Seon Hong:
Response driven efficient task load assignment in mobile crowdsourcing. 442-446 - Yun-Hee Son, Kyu-Chul Lee:
Cloud of things based on linked data. 447-449 - Pankaj Kumar Dalela, Pramod Bhave, Pushpender Yadav, Anshul Yadav, Vipin Tyagi:
Beam Division Multiple Access (BDMA) and modulation formats for 5G: Heir of OFDM? 450-455 - Myungwhan Choi, Areeya Rubenecia, Hyo Hyun Choi:
Reservation-based cooperative traffic management at an intersection of multi-lane roads. 456-460 - Thanh Dinh, Younghan Kim:
An efficient improvement potential-based virtual network function selection scheme for reliability/availability improvement. 461-463 - Kenichi Yoshida, Tomonori Manabe:
Video streaming service and CD sales. 464-469 - Yafeng Deng, Young-June Choi:
Broadcast MAC protocol using relative distance for periodic safety messages in vehicular networks. 470-472 - Pinyaphat Tasatanattakool, Chian Techapanupreeda:
Blockchain: Challenges and applications. 473-475 - Seonjoo Choi, Jaesung Lim, Hoki Baek:
Weighted frequency hopping control in TDL for coexistence of satellite spectrum. 476-481 - Piyapong Dangkham:
Mobile augmented reality on web-based for the tourism using HTML5. 482-485 - Waqas ur Rahman, Kwangsue Chung:
An efficient rate adaptation algorithm for streaming over HTTP. 486-491 - Sun Park, JongWon Kim, ByungRae Cha:
Design of marine environment monitoring system based on open source softwares. 492-494 - D. C. Grant:
Distributed detection and response for the mitigation of distributed denial of service attacks. 495-497 - Paul Alvin V. Sacedor, Victor M. Romero:
An interest-driven peer-to-peer micro-blogging system over delay tolerant networks. 498-503 - Imran A. Zualkernan, Fadi A. Aloul, Fayiz Basheer, Gurdit Khera, Shruthi Srinivasan:
Intelligent accident detection classification using mobile phones. 504-509 - Haitham Khaled, Md. Munjure Mowla, Iftekhar Ahmad, Daryoush Habibi:
A software defined radio based power saving strategy for next generation mobile systems. 510-515 - Md. Shirajum Munir, Sarder Fakhrul Abedin, Md. Golam Rabiul Alam, Nguyen Hoang Tran, Choong Seon Hong:
Intelligent service fulfillment for software defined networks in smart city. 516-521 - Bokyung Seo, Myungjae Shin, Yeong Jong Mo, Joongheon Kim:
Top-down parsing for Neural Network Exchange Format (NNEF) in TensorFlow-based deep learning computation. 522-524 - Sujin Oh, HaRim Jung, Ung-Mo Kim:
An efficient processing of range spatial keyword queries over moving objects. 525-530 - Ferdinando Battiati, Girolamo Catania, Lucio Ganga, Giacomo Morabito, Agatino Mursia, Andrea Viola:
CSSS: Cyber security simulation service for software defined tactical networks. 531-533 - Changwoo Kim, Yujeong Oh, Jaiyong Lee:
Latency-based graph selection manager for end-to-end network service on heterogeneous infrastructures. 534-539 - Sun-young Park, Keecheon Kim:
A study on the processing and reinforcement of message digest through two-dimensional array masking. 540-544 - Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said:
Towards a self-adaptive access control middleware for the Internet of Things. 545-550 - Jongsoek Choi, Yongtae Shin, Sunok Cho:
Study on information security sharing system among the industrial IoT service and product provider. 551-555 - Vishal Maheshwari, Ashutosh Bhatia, Kuldeep Kumar:
Faster detection and prediction of DDoS attacks using MapReduce and time series analysis. 556-561 - Wonjoo Park, Jeong Woo Son, Sang-Yun Lee, Sun-Joong Kim:
Multi-view topic model learning to generate audience metadata automatically. 562-564 - HyunChul Joh:
Quantitative security analysis of network OSes by fitting VDM and examining CVSS. 565-570 - Jason R. Lee, Shane Richard Canon, Tina Declerck, Brent Draney, David Paul, David Skinner:
Enhancing supercomputing with software defined networking. 571-576 - Luis Jurado Perez, Joaquin Salvachua Rodriguez:
Simulation of scalability in IoT applications. 577-582 - Milim Lee, Changkun Park:
A 2.4-GHz VCO using a symmetric layout technique to minimize mismatches in differential signals. 583-585 - Jamila I. Idrisova, Vladimir N. Myasnikov, Aleksey I. Uljanov, Natalia V. Belina:
Increasing the efficiency of labor protection in the enterprise. 586-588 - Alexey V. Bataev, Dmitriy G. Rodionov, Ekaterina S. Kosonogova:
Evaluation of efficiency of using bank smart-card in Russian financial institutions. 589-593 - Alexey V. Bataev, Dmitriy G. Rodionov, Darya A. Andreyeva:
Analysis of world trends in the field of cloud technology. 594-598 - Yahya Al Sawafi, Abderezak Touzene, Khaled Day, Nasser Alzeidi:
Toward hybrid RPL based IoT sensing for smart city. 599-604 - Changmin Lee, Duckhee Lee, Jaiyong Lee:
Occupancy-based adaptive dimmable lighting energy management scheme combined with cyber physical system. 605-610 - N. I. Didenko, D. F. Skripnuk, K. N. Kikkas, V. Sevashkin, G. Romashkin, S. V. Kulik:
Innovative and technological potential of the region and its impact on the social sector development. 611-615 - Yonghwi Kim, Sanghyun An, Jungmin So:
Identifying signal source using channel state information in wireless LANs. 616-621 - Daniel S. Demidenko, Ekaterina D. Malevskaia-Malevich, Yulia A. Dubolazova:
ISO as a real source of funding. Pricing issues. 622-625 - N. I. Didenko, D. F. Skripnuk, K. N. Kikkas, Viktor Merkulov, G. Romashkin, S. V. Kulik:
The analysis of convergence - Divergence in the development of innovative and technological processes in the countries of the Arctic Council. 626-631 - Madiha Razzaq, Ningombam Devarani Devi, Seokjoo Shin:
Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size. 632-635 - Tatiana J. Kudryavtseva, Angi E. Skhvediani, Arseniy A. Bondarev:
Digitalization of banking in Russia: Overview. 636-639 - Han Bum Lee, Sang Il Kim, Hwa Sung Kim:
A fault management system for NFV. 640-645 - Shingo Nakajima, Toshiki Yamasaki, Koki Matsumoto, Kazuki Uemura, Tomotaka Wada, Kazuhiro Ohtsuki:
Behavior recognition and disaster detection by the abnormal analysis using SVM for ERESS. 646-651 - Dong-Kyu Choi, Joong-Hwa Jung, Seok-Joo Koh:
Enhanced cluster-based CoAP in Internet-of-Things networks. 652-656 - Joong-Hwa Jung, Dong-Kyu Choi, Seok-Joo Koh:
Distributed pub/sub model in CoAP-based Internet-of-Things networks. 657-662 - Takahiro Nogiwa, Kouji Hirata:
Identification of TCP congestion control algorithms with convolution neural networks. 663-665 - Akihiro Ikeda, Naoki Akiyama, Toshiaki Miyazaki:
Formal verification for wireless sensor network in consideration of communication errors. 666-670 - Y. A. Makarichev, A. S. Anufriev, Y. N. Ivannikov, N. I. Didenko, A. Gazizulina:
Low - Power wind generator. 671-672 - Anuradha Wickramarachchi, Dulaj Atapattu, Pamoda Wimalasiri, Ravidu Mallawa Arachchi, Gihan Dias:
Use of nomadic computing devices for storage synchronization. 673-678 - Oanh Tran Thi Kim, Nguyen Hoang Tran, Vandung Nguyen, Sun Moo Kang, Choong Seon Hong:
Cooperative between V2C and V2V charging: Less range anxiety and more charged EVs. 679-683 - Seungmin Lee, Soojin Park, Young B. Park:
State diagram based IoT Ecosystem's IoT device conflict problem migration method. 684-688 - Keecheon Kim, Junghyun An, Joseph Yoo:
A design of IL-CyTIS for automated cyber threat detection. 689-693 - Riku Ohmiya, Hiroyasu Obata, Tutomu Murase:
Optimal placement considering interference in multiple ad hoc networks. 694-699 - Isamu Shimada, Hiroaki Higaki:
Interference of overhearing by eavesdropper nodes for secure wireless ad-hoc networks. 700-705 - Seohee You, Dana Yang, Inshil Doh, Kijoon Chae:
Authorization based on mobile whitelist in devices for device-to-device communications. 706-711 - Sol Jeon, Inshil Doh, Kijoon Chae:
RMBC: Randomized mesh blockchain using DBFT consensus algorithm. 712-717 - Takayuki Ojima, Takeo Fujii:
Resource management for mobile edge computing using user mobility prediction. 718-720 - Kashif Naseer Qureshi, Faisal Bashir, Abdul Hanan Abdullah:
An energy and link aware next node selection protocol for body area networks. 721-726 - SungSik Park, Young B. Park:
Photovoltaic power data analysis using hierarchical clustering. 727-731 - Lummanee Chanama, Olarn Wongwirat:
A comparison of decision tree based techniques for indoor positioning system. 732-737 - P. Sethu Lakshmi, M. G. Jibukumar, V. S. Neenu:
Network lifetime enhancement of multi-hop wireless sensor network by RF energy harvesting. 738-743 - Thien-Binh Dang, Manh-Hung Tran, Duc-Tai Le, Vyacheslav V. Zalyubovskiy, Hyohoon Ahn, Hyunseung Choo:
Trend-adaptive multi-scale PCA for data fault detection in IoT networks. 744-749 - Winai Nadee, Korawit Prutsachainimmit:
Towards data extraction of dynamic content from JavaScript Web applications. 750-754 - Xiaoxiao Wu, Li Wang, Shibing Zhang, Guodong Zhang:
Phase-compensation-based cooperative spectrum sensing algorithm for cognitive cloud networks. 755-759 - Mandeep Kumar, Ketan Sabale, S. Mini, Trilochan Panigrahi:
Priority based deployment of IoT devices. 760-764 - Viet Hoang Vu, Quang Tran Minh, Phu H. Phung:
An airfare prediction model for developing markets. 765-770 - Tetsuya Noguchi, Osamu Takyu, Fumihito Sasamori, Shiro Handa, Takeo Fujii, Tomoaki Ohtsuki:
Transmit control for secure information sharing in untrusted relay with two antennas. 771-775 - Thi Minh Chau Nguyen, Doan B. Hoang, Thanh Dat Dang:
A software-defined model for IoT clusters: Enabling applications on demand. 776-781 - V. Sreejith, Rutuja Surve, Nikhil Vyas, K. R. Anupama, Lucy J. Gudino:
Area based routing protocol for mobile wireless sensor networks. 782-786 - Ryo Kurosawa, Osamu Takyu, Fumihito Sasamori, Shiro Handa, Mai Ohta, Takeo Fujii:
Experimental study of signaling with IFDMA modulation and nonlinear amplifying for recovering access channel mismatch. 787-790 - Ashis Talukder, Sarder Fakhrul Abedin, Md. Shirajum Munir, Choong Seon Hong:
Dual threshold load balancing in SDN environment using process migration. 791-796 - Sriharsha Karamchati, Shatrunjay Rawat, Sudhir Yarram, Guru Prakash Ramaguru:
Mapping mechanism to enhance QoS in IP networks. 797-803 - Litao Guo:
Reliability measures of crossed cube networks. 804-806 - Kyung-Taek Lee, Hyoseok Yoon, Youn-Sung Lee:
Implementation of smartwatch user interface using machine learning based motion recognition. 807-809 - Wonjung Kim, Tae-Yoon Kim, Sohyun Joo, Sangheon Pack:
An opportunistic MAC protocol for full duplex wireless LANs. 810-812 - F. P. Polly, S. K. Shil, Mohammad Arif Hossain, A. Ayman, Yeong Min Jang:
Detection and classification of HGG and LGG brain tumor using machine learning. 813-817 - Junmin Park, Hyunjae Park, Young-June Choi:
Data compression and prediction using machine learning for industrial IoT. 818-820 - Chang-Mo Yang, Yusik Choo, Sungjoo Park:
Semi-automatic image and video annotation system for generating ground truth information. 821-824 - Kimoon Kang, Hyun-Chool Shin:
EMG based gesture recognition using feature calibration. 825-827 - Jaeyun Lee, Woo-Jin Song, Hyun-Chool Shin:
EEG binarization for burst suppression segmentation. 828-830 - Changseok Bae, Henry Wing Fung Teung, Yuk Ying Chung:
Effective object tracking framework using weight adjustment of particle swarm optimization. 831-833 - Kiwon Rhee, Hyun-Chool Shin:
Finger motion recognition robust to diverse arm postures using EMG and accelerometer. 834-836 - Inseok Yeo, Hyun-Chool Shin:
Novel Korean finger language recognition using EMG and motion sensors. 837-839 - Hyejin An, Hyun-Chool Shin:
Development of multi-channel brain stimulator. 840-842 - Heemang Song, Hyun-Chool Shin:
A probability model of stationary object using radar time-frequency spectrum. 843-845 - Dat Vuong, Jaejin Lee, Sun K. Hong, Won-Yong Shin, Myungsik Yoo:
Interpixel interference mitigation using differential coding in vehicular visible light communication based image sensor. 846-847 - KangYoon Lee, Neul Ha:
AI platform to accelerate API economy and ecosystem. 848-852 - Hyungkeun Lee, Inhye Park:
Performance of a receiver-initiated MAC protocol with aggregation for event-driven wireless sensor networks. 853-856 - Thanh-Tuan Le, Dien Nguyen Van, Eun-Seok Ryu:
Real-time 360-degree video streaming over millimeter wave communication. 857-862 - Youngho Kim, Yun-kyung Lee, Jeongnyeo Kim:
RIPPLE: Adaptive fine-grained access control in multi-hop LLNs. 863-868 - Seehwan Yoo:
Leveraging multicores for mobile edge computing. 869-874 - Andrey Giyenko, Akmaljon Palvanov, Younglm Cho:
Application of convolutional neural networks for visibility estimation of CCTV images. 875-879 - Hwee-Pink Tan, Austin Zhang:
Real-world large-scale IoT systems for community eldercare: A comparative study on system dependability. 880-885 - Dohyun Kwon, Joongheon Kim:
Distributed dynamic power-aware buffering for multi-Gbps video streaming in IEEE 802.11ad fast session transfer. 886-890 - Dong-Hyun Lee, Young-Bo Shim, Myoung-Jin Kim, Yeon-Kug Moon:
Hybrid positioning system for improving location recognition performance in offshore plant environment. 891-893 - Dong-Hyun Lee, Young-Bo Shim, Myoung-Jin Kim, Yeon-Kug Moon:
The UWB-based positioning algorithm and H/W development for safety of offshore plant workers. 894-896 - Sunjun Hwang, Kyeong Seon Kim, Yejin Kim, Junhui Kim, Miji Park, SooHyun Park, Joongheon Kim:
High-dimensional statistical supervised learning for extracting information in steganography. 897-898 - Ali Gohar, Sanghwan Lee:
A fast remote driver selection mechanism for remote-controlled driving systems. 902-905 - Hyeon Kyu Lee, Young-Seok Choi:
A convolution neural networks scheme for classification of motor imagery EEG based on wavelet time-frequecy image. 906-909 - Minsoo Yeo, Y. Koo, Y. Yoon, T. Hwang, J. Ryu, J. Song, Cheolsoo Park:
Flow-based malware detection using convolutional neural network. 910-913 - Heejun Lee, Youngjoo Kim, Cheolsoo Park:
Classification of human attention to multimedia lecture. 914-916 - W. Seok, Youngjoo Kim, Cheolsoo Park:
Pattern recognition of human arm movement using deep reinforcement learning. 917-919 - Zhenlong Peng, Jian An, Xiaolin Gui, Tianjie Wu, Zhenlong Peng:
PTDU: Public transit system based framework of data upload in urban crowd sensing. 920-925 - Kamrul Hasan, Seong-Ho Jeong:
CCN-based vehicular communications. 926-929 - Jungsoo Park, Hojin Chun, Souhwan Jung:
API and permission-based classification system for Android malware analysis. 930-935 - Chan Hyeok Lee, Ki-Hyung Kim:
Implementation of IoT system using block chain with authentication and data protection. 936-940 - Jin Hyeong Jeon, Ki-Hyung Kim, Jai-Hoon Kim:
Block chain based data security enhanced IoT server platform. 941-944 - Ilyoung Chong, Sajjad Ali, Sanghong Lee:
Intelligence provisioning model to support web objects enabled ubiquitous self-directed learning. 945-948 - Junsu Oh, Heemang Song, Hyun-Chool Shin:
Recognition of the upper structure using the RCS characteristic of the automotive radar. 949-952 - Amirul Islam, Md. Tanvir Hossan, Mostafa Zaman Chowdhury, Yeong Min Jang:
Design of an indoor positioning scheme using artificial intelligence algorithms. 953-956 - (Withdrawn) State of the art and challenges facing consensus protocols on blockchain. 957-962
- Yeasom Lee, Wonjae Choi, Bong-Soo Sohn:
Immersive gesture interfaces for 3D map navigation in HMD-based virtual environments. 963-965
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.