


default search action
ICNCC 2016: Kyoto, Japan
- Proceedings of the Fifth International Conference on Network, Communication and Computing, ICNCC '16, Kyoto, Japan, December 17-21, 2016. ACM 2016, ISBN 978-1-4503-4793-8

Image and signal processing
- Mary Jane Magno-Tan, Armin S. Coronado

, Rustom R. Garcia, May D. Maulani:
Weight Measurement of Holothuria Scabra Jaeger, 1833 Utilizing the Surface Area of Digitized Image Captured under Water. 1-5 - Ao Wu, Yongming Huang, Guobao Zhang

:
Feature Fusion Methods for Robust Speech Emotion Recognition Based on Deep Belief Networks. 6-10 - Suratose Tritilanunt, Surapol Ruaysungnoen:

Security Assessment of Information System in Hospital Environment. 11-16 - P. S. Joseph Ng

, C. M. Kang, Ahmad Kamil Mahmood, S. W. Wong, K. Y. Phan, Seow Hui Saw
, Jit Theam Lim:
EaaS: Available yet Hidden Infrastructure inside MSE. 17-21 - Saihua Song, Heng Yao, Chuan Qin

, Ying Tian:
A Forgery Video Detection Algorithm for Resolution Promotion Manipulations Using Frequency Spectrum Analysis. 22-26 - Chu-Hui Lee, Zhi-Yong Qiu:

Motion Image De-blurring System Based on the Effectiveness Parameters of Point Spread Function. 27-31 - Shanlan Nie, Haopeng Zhang

, Zhiguo Jiang:
Sea-Land Segmentation Based on Template Matching. 32-36 - Bundit Manaskasemsak, Bodin Chinthanet, Arnon Rungsawang:

Graph Clustering-Based Emerging Event Detection from Twitter Data Stream. 37-41 - Xiaoling Wang, Yao Wang, Xue Wang:

Quality Monitoring, Analysis and Evaluation of BDS B1I Signal. 42-46 - Hisyam Fahmi

, Remmy A. M. Zen, Hadaiq Rolis Sanabila, Ida Nurhaida
, Aniati Murni Arymurthy:
Feature Selection and Reduction for Batik Image Retrieval. 47-52 - Tarun Kumar, Suraj Gupta, Dharmender Singh Kushwaha:

An Efficient Approach for Automatic Number Plate Recognition for Low Resolution Images. 53-57 - Zhonghua Wang, Faliang Huang, Shijie Hu:

Bidirectional Diffusion Algorithm for Image Enhancement with Local Feature. 58-62 - Yi-Shan Lin, Chun-Liang Lee, Yaw-Chung Chen:

Length-bounded Hybrid CPU/GPU Pattern Matching Algorithm for Deep Packet Inspection. 63-67 - Zhao Wang, Yuan Xi:

A Kind of De-noising and Segmentation Method for Hollow CAPTCHAs with Noise Arcs. 68-72 - Radi M. Kadushnikov, Sergey Studenok, Vyacheslav V. Mizgulin:

The Real Time Endoscopic Image Analysis Algorithm. 73-77
Network engineering and technology application
- Anak Agung Putri Ratna, F. Astha Ekadiyanto, Mardiyah, Prima Dewi Purnamasari

, Muhammad Salman:
Analysis on the Effect of Term-Document's Matrix to the Accuracy of Latent-Semantic-Analysis-Based Cross-Language Plagiarism Detection. 78-82 - Hsin-Tsung Lin, Pi-Chung Wang

:
TCAM-Based Packet Classification Using Multi-stage Scheme. 83-87 - Clief Hendro Sengkey, Hsien-Tsung Chang

:
A Topic of Interest-based Approach on Online Social Network Services for Information Sharing. 88-92 - Shaifu Gupta, Aroor Dinesh Dileep, Timothy A. Gonsalves:

Fractional Difference based Hybrid Model for Resource Prediction in Cloud Network. 93-97 - Bo Li, Jinzhen Wang, Ping Zhao, Zhongjiang Yan, Mao Yang:

Research of Recognition System of Web Intrusion Detection Based on Storm. 98-102 - Lu Chen, Lianchen Liu, Jiaxing Shang:

Fault Tolerance for Web Service Based on Component Importance in Service Networks. 103-109 - Ge Luo, Ying Gao, Changchun Zheng:

Strongly Secure Network Coding via Reed-Solomon Codes. 110-114 - Jian Xie, Lin Gong, Zijian Zhang, Yan Yan, Sheng Tang:

Innovation Oriented Hyper Model and Evolution of Knowledge Network. 115-119 - Ivan Nikolaev, Martin Grill, Veronica Valeros

:
Exploit Kit Website Detection Using HTTP Proxy Logs. 120-125 - Jing Deng, Xiaoli Gao, Chunyue Wang:

Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks. 126-130
Computer science and information technology
- Saurabh Kumar, Shana Moothedath, Prasanna Chaporkar, Madhu N. Belur:

An MCMC Based Course to Teaching Assistant Allocation. 131-134 - Prima Dewi Purnamasari

, Anak Agung Putri Ratna, Benyamin Kusumoputro:
Artificial Neural Networks Based Emotion Classification System through Relative Wavelet Energy of EEG Signal. 135-139 - Chatchai Kasemtaweechok

, Worasait Suwannik:
Prototype Selection for k-Nearest Neighbors Classification Using Geometric Median. 140-144 - Gridaphat Sriharee:

A Federated GIS Data Service System for Tabular Data Integration Using Ontology Approach. 145-149 - Ching-Hsue Cheng

:
A Text Mining Based on Refined Feature Selection to Predict Sentimental Review. 150-154 - Walaithip Thanakorncharuwit, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn:

Generating Test Cases from UML Activity Diagram Based on Business Flow Constraints. 155-160 - Worasit Choochaiwattana:

An Architecture of an Academic Search Engine with Personalized Search Result Ranking Mechanism. 161-165 - Sepehr Forouzani, Yin Kia Chiam

, Soroush Forouzani:
Method for Assessing Software Quality Using Source Code Analysis. 166-170 - Shengyingjie Liu, Jianwen Sun, Zhi Liu, Xian Peng, Sanya Liu:

Query-Directed Probing LSH for Cosine Similarity. 171-177 - Yang Xie, Xiaolu Zhou, Zepeng Wen, Hui Xie:

Research of a Double Temporal Object-oriented Data Model. 178-181 - Merve Güllü, Eyüp Burak Ceyhan, Ceren Ulucan:

A New Approach: Predicting Height of a Person from Joint Ratio of Fingers. 182-187 - Shipeng Xu, Hongzhi Yu, Guanyu Li, Hanbin Zhang, Jun Ma:

Acoustic Modeling for Lhasa Tibetan Speech Synthesis Based on DAEM Algorithm. 188-192 - Mahanama Wickramasinghe

, Hui Guo:
Data-Space Relocation to Improve Data Cache Performance for Embedded Multi-threaded Processor Systems. 193-197 - Eko Kuswardono Budiardjo, Elviawaty Muisa Zamzami, Ganjar Ramadhan, Muh. Nur Musa:

Ontology-Based Knowledge Management System Model for R3ST Software Maintenance Environment. 198-202 - Sayaka Kamei

, Hirotsugu Kakugawa:
An Asynchronous Message-passing Distributed Algorithm for the Generalized Local Critical Section Problem. 203-207 - Xue Zhang, Lu Peng, Chenyan Li, Qing Li:

Construct Parity-check Matrix H of QC LDPC Codes via Arithmetic Progression. 208-212 - Narongsak Chayangkoon, Anongnart Srivihok:

Two Step Clustering Model for K-Means Algorithm. 213-217 - Jianguo Hao, Zhijia Wang, Yibin Tu, Heng Zhang:

Architecture of LVC Systems based on Real-Time Simulation Proxy. 218-223
Mobile communication and wireless technology
- Qian Cui, Kai Shuang:

Feasibility Analysis of SCMA in Logging Cable Telemetry Systems with an Optimal 16-point Codebook. 224-228 - Cheng-Chi Lee

, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li
:
Cryptanalysis of Dimitriou's Key Evolving RFID Systems. 229-233 - Qian Cui, Kai Shuang:

A New Modeling Approach using Genetic Algorithm for Transmission Performance Estimation in Complex Environment. 234-238 - Xiaopeng Liu, Xihong Chen, Zedong Xie:

Application of OQAM/OFDM Modulation in Troposcatter Communication. 239-245 - Zedong Xie, Xihong Chen, Xiaopeng Liu:

Effect of Doppler Shift on the MIMO-OFDM Systems in Troposcatter Fading Channels. 246-251 - Qingyun Fang, Yubing Han, Xuan Chen, Kai Qi, Mengyao Qi, Yi Zhang:

OFDM Channel Estimation Based on Fast Approximated Power Iteration Subspace Tracking. 252-256 - Wanming Hao, Osamu Muta, Haris Gacanin

, Hiroshi Furukawa:
Energy-Efficient Resource Allocation for Cooperative Cognitive Radio Networks with Imperfect Spectrum Sensing. 257-261 - Ahsan Jamal Akbar

, Zhuchuang Shao, Dong Wang:
Target Discovery: Using MUSIC with Optimized Angle-of-Arrival and Signal-Time-of-Flight. 262-266 - Kazuki Maruta

, Yu Nakayama
, Takuya Tsutsumi:
Throughput Performance Evaluation on Wired and Wireless Network Cooperation Quick Recovery System Employing IEEE 802.11 DCF. 267-271 - Motoi Kodama

, Shinichiro Haruyama:
Visible Light Communication using Two Different Polarized DMD Projectors for Seamless Location Services. 272-276 - Zhiguo Liu, Lingyu Qin, Li Yao:

Service-Oriented Virtual Resource Management Framework for Satellite Network. 277-281
Performance analysis of Wireless Sensor Networks
- Sang Guun Yoo

:
Cryptanalysis of Several Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks. 282-286 - Peng Geng

, Yan Liu, Jie Yang:
A Dynamic Energy Balance Method for Wireless Sensor Networks with Small World Characteristics. 287-291 - Mirza Ferdous Rahman, Farhad Mehdipour, Hiroshi Furukawa:

Modeling the Impact of Clustering with Random Event Arrival on the Lifetime of WSN. 292-296 - Zhenqiang Wei, Hoon Oh

:
A Receiver-Initiated Big Slot Scheduling MAC Protocol for Reducing Collision in Wireless Sensor Networks. 297-301 - Ibtisam Joda Habeeb, Ra'ad A. Muhajjar

:
Secured Wireless Sensor Network Using Improved Key Management. 302-305
Intelligent control system and application
- Nadea Nabilla Putri, Arsla Khan, Soo Young Shin

:
Quadcopter Based Localization with Archimedian Trajectory. 306-309 - Karlisa Priandana

, Wahidin Wahab, Benyamin Kusumoputro:
Comparison of Neural Networks Based Direct Inverse Control Systems for a Double Propeller Boat Model. 310-315 - Myung-Jin Chung, Chong-Seong Hong:

Monitoring and Controlling Method of the Environment Condition in the Animal Breeding Farm by Using Smart Phone. 316-320 - Kuei-Chung Chang, Po-Kai Liu, Hung Hsiang Lin:

Design of Cameras Gateway for Remote Monitoring and Human Tracking. 321-325 - Jun-Dong Chang:

Spatial-Temporal Based Traffic Speed Imputation for GPS Probe Vehicles. 326-330 - Mark Tee Kit Tsun

, Lau Bee Theng
, Hudyjaya Siswoyo Jo, Sian Lun Lau
:
Proposing a Sensor Fusion Technique Utilizing Depth and Ranging Sensors for Combined Human Following and Indoor Robot Navigation. 331-335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














