default search action
6th CICSyN 2014: Tetova, Macedonia
- David Al-Dabass, Vullnet Ameti, Fauzi Skenderi, Festim Halili:
Sixth International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2014, Tetova, Macedonia, May 27-29, 2014. IEEE 2014, ISBN 978-1-4799-5076-8
01-A Intelligent Systems
- Ana Ktona, Denada Xhaja, Ilia Ninka:
Extracting Relationships between Students' Academic Performance and Their Area of Interest Using Data Mining Techniques. 6-11 - Monika Simjanoska, Sasko Ristov, Marjan Gusev:
Generative Modelling and Classification of Students' E-Learning and E-Assessment Results. 12-17 - Nidal AlBeiruti, Khalid Al-Begain:
Using Hidden Markov Models to Build Behavioural Models to Detect the Onset of Dementia. 18-26
03-C Sensor Nodes, Circuits, Devices, Wireless Sensor Networks
- Osama Abouelkhair, Amr Elsaadny:
Multipath Adaptive Periodic Threshold-Sensitive Energy Efficient Protocol for Wireless Sensor Networks. 33-37 - Basri Ahmedi, Pece Mitrevski:
Inclusion of Socio-economic Indicators in the Cost Modeling of a WAN Network. 38-43
06-F Modelling and Performance
- Gautam Thakur, Sanjeev Thakkar, Yash Upadhyay:
New Simulation Model for Power Density of RF Waves and Its Field Verification. 48-53 - Harry Raymond Joseph, Arathi Sunder Mary:
An Intelligent Discrete Event Monte-Carlo Implementation Algorithm: Application to the Simulation of Indo-China Policy as a Bayesian Network. 54-58 - Srdjana Dragicevic, Stipe Celar, Luksa Novak:
Use of Method for Elicitation, Documentation, and Validation of Software User Requirements (MEDoV) in Agile Software Development Projects. 65-70 - Shiraz Latif, Aftab Ahmad Memon, Bhawani Shankar Chowdhry, Ryszard J. Zielinski, Muhammad Ullah Khan Ghazanfar:
Accuracy Assessment of D-Model for Modeling Wall Attenuation in Indoor Environment. 71-76 - Hisham Jameel A. Bardesi, Mohammed Abdel Razek:
Learning Outcome E-Exam System. 77-82
08-H Tools and Techniques for Design, Deployment, Testing, and Evaluation
- Shkurte Luma Osmani, Gjulie Arifi, Florim Idrizi:
Choosing the Most Suitable Model for Developing a Software. 83-88
09-I Security, Authentication, Wireless Security, Dependability
- Michael N. Moeti, Billy Mathias Kalema:
Analytical Hierarchy Process Approach for the Metrics of Information Security Management Framework. 89-94 - Sasko Ristov, Marjan Gusev, Aleksandar Donevski:
Security Vulnerability Assessment of OpenStack Cloud. 95-100 - Mitko Bogdanoski, Aleksandar Risteski, Pero Latkoski, Tomislav Shuminoski:
Power Control as an Effective Method against Low Power Jamming. 101-106
14-N Parallel and Distributed Architectures and Systems
- Stavros Souravlas, Manos Roumeliotis:
Dynamic Load Balancing on All-to-All Personalized Communications Using the NNLB Principal. 107-112 - Isak Shabani, Amir Kovaci, Agni Dika:
Possibilities Offered by Google App Engine for Developing Distributed Applications Using Datastore. 113-118 - Dorian Minarolli, Bernd Freisleben:
Cross-Correlation Prediction of Resource Demand for Virtual Machine Resource Allocation in Clouds. 119-124 - Aleksandar Bahtovski, Marjan Gusev:
Developing Challenges for a Cloudlet Solution of a Multi-lingual Dictionary Application. 125-130 - Artrim Kjamilji:
Multi-objective Optimizations during Parallel Processing in a Dynamic Heterogeneous Cloud Environment. 131-138 - Festim Halili, Merita Kasa Halili, Ilia Ninka:
Evaluation and Comparison of Styles of Using Web Services. 139-144
15-O Internet Modelling, Semantic Web, and Ontologies
- Agon Memeti, Betim Cico:
Supporting Content and Learner Collaboration and Interaction through Cloud Computing Models. 145-148 - Fisnik Dalipi, Florim Idrizi, Eip Rufati, Florin Asani:
On Integration of Ontologies into E-Learning Systems. 149-152
16-P Mobile Adhoc Networks
- Stojan Kitanov, Toni Janevski:
State of the Art: Mobile Cloud Computing. 153-158 - Zoran Nusev, Aleksandar Risteski:
Design Issues of Interoperable Communication System for Public Safety - Planning for the Unplanned. 159-163 - Ashutosh Kuntal, Purnendu Karmakar:
Range-Free Localization Algorithm for IEEE802.11 WLAN Based on K-NN. 164-169 - Avani Sharma, Rajbir Kaur, Purnendu Karmakar:
JFDV Attack: Influence on Workability of Mobile Ad-Hoc Networks. 170-175 - Hussein ElAttar, Hussein Abdelaty, Salwa H. El-Ramly, Mohamed A. Aboul-Dahab:
Enhancing the Performance of Wireless Adhoc Networks Using Spreading Codes. 176-181
17-Q Vehicular Technology and Networks
- Saed Tarapiah, Shadi Atalla, Nooraldin Muala, Sundos Tarabeh:
Offline Public Transportation Management System Based on GPS/WiFi and Open Street Maps. 182-185 - Clemens Dannheim, Christian Icking, Markus Mäder, Philip Sallis:
Weather Detection in Vehicles by Means of Camera and LIDAR Systems. 186-191
19-S QoS for Data Dissemination, Voice, and Video in Wireless Networks
- Emad Danish, Varuna De Silva, Anil Fernando:
Application of Genetic and Greedy Algorithms for Power Efficiency in Adaptive Sub-channel and Bit Allocation. 192-195
22-V Circuits, Sensors, and Devices
- Amar Bousbaine, Ebimobowei Yabefa:
Modelling and Simulation of a Multi-level DC-DC Converter for HEV and EV Applications. 196-201 - Nikolay N. Prokopenko, Petr S. Budyakov, Ilya V. Pakhomov:
Circuit Design of Classical Stages with Bandwidth Enhancement Technique. 202-206 - Nikolay N. Prokopenko, Petr S. Budyakov, Nikolay V. Butyrlagin:
Methods of Increasing Voltage Gain of the Low-Voltage Classical Stages. 207-211 - Nikolay N. Prokopenko, Petr S. Budyakov, Nikolay V. Butyrlagin, A. S. Budyakov:
The Architectures of the Differential Amplifiers on SiGe Bipolar Transistors with Low Voltage Supply. 212-217 - Sergey G. Krutchinsky, Nikolay N. Prokopenko, Petr S. Budyakov, Nikolay V. Butyrlagin:
SiGe Selective Amplifier of Microwave Range with High Asymptotic Attenuation. 218-221
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.