


default search action
ICOIN 2018: Chiang Mai, Thailand
- 2018 International Conference on Information Networking, ICOIN 2018, Chiang Mai, Thailand, January 10-12, 2018. IEEE 2018, ISBN 978-1-5386-2290-2

- Mubbashir Ayub, Mustansar Ali Ghazanfar, Muazzam Maqsood

, Asjad Saleem:
A Jaccard base similarity measure to improve performance of CF based recommender systems. 1-6 - Hoon-Keng Poon, Wun-She Yap, Yee-Kai Tee

, Bok-Min Goi, Wai-Kong Lee:
Document level polarity classification with attention gated recurrent unit. 7-12 - Jiabin Qu, Xinyu Gu, Lin Zhang:

Improved UGRNN for short-term traffic flow prediction with multi-feature sequence inputs. 13-17 - Hwayoung Choi, Kyung-Jin You, Hyun-Chool Shin:

Multi-finger motion inference using M1 neural decoding. 18-20 - Jeffrey Spaulding, Jeman Park

, Joongheon Kim
, Aziz Mohaisen
:
Proactive detection of algorithmically generated malicious domains. 21-24 - Wasiq Noor Ahmad Qasmi, Taimur Siddiqui, Muhammad Karam Shehzad, Adnan Iqbal, Muhammad Saqib Ilyas:

A comparative study of failover schemes for IaaS recovery. 25-30 - Hamza Hammami, Hanen Brahmi, Sadok Ben Yahia

:
Secured outsourcing towards a cloud computing environment based on DNA cryptography. 31-36 - Hamza Hammami, Hanen Brahmi, Sadok Ben Yahia

:
Towards a new security approach based on heartbeat authentication to ensure security of cloud data access. 37-43 - Muhammad I. H. Sukmana

, Kennedy A. Torkura, Feng Cheng, Christoph Meinel, Hendrik Graupner
:
Unified logging system for monitoring multiple cloud storage providers in cloud storage broker. 44-49 - Abdallah Ali Zainelabden Abdallah Ibrahim, Sébastien Varrette

, Pascal Bouvry
:
PRESENCE: Toward a novel approach for performance evaluation of mobile cloud SaaS Web Services. 50-55 - Duc-Nghia Vu

, Nhu-Ngoc Dao
, Sungrae Cho
:
Downlink sum-rate optimization leveraging hungarian method in fog radio access networks. 56-60 - Minho Han, Sun-Joong Kim:

User scenario based video contents creation system. 61-63 - Sanghoon Lee, Ilhong Shin, Eunjun Rhee, Sunghee Lee, Namkyung Lee:

A transformation analysis of 3D virtual object for projection mapping. 64-66 - Seunghyeon Moon, Sungkwan Jung, Seungyong Jung:

A study on trust factors in a multimedia service environment. 67-69 - Choi Myung Jin, Kim Tae Young, Lee Min Seob, Kim Min Jae:

A study on near-real-time geometric correction system of drones image. 70-72 - Tai-Won Um, Gyu Myoung Lee, Hyun-Woo Lee:

Trustworthiness management in sharing CDN infrastructure. 73-75 - Jun Wook Lee, Yong Woo Kim:

A study on smart IoT hub for intelligent signage services using trust information. 76-79 - Tanaphol Suebchua, Bundit Manaskasemsak, Arnon Rungsawang, Hayato Yamana

:
History-enhanced focused website segment crawler. 80-85 - Hideki Kondo, Kazumasa Takami:

Individualized electric power management system using BLE tag at a shared house. 86-91 - Charles Edward A. Robin, Victor M. Romero

:
DTNDocs: A delay tolerant peer-to-peer collaborative editing system. 92-97 - Kazuki Uemura, Hiroki Murotsu, Koki Matsumoto, Shingo Nakajima, Tomotaka Wada, Kazuhiro Ohtsuki:

Number ofpeople grasp system of neighboring terminals using Bluetooth low energy. 98-103 - Chun-De Chang, Hui-Tang Lin:

On similarities of string and query sequence for DGA botnet detection. 104-109 - Ray Neiheiser

, Daniel Presser, Luciana Rech, Manuel Bravo, Luís E. T. Rodrigues, Miguel Correia:
Fireplug: Flexible and robust N-version geo-replication of graph databases. 110-115 - Krisada Sangsanit, Werasak Kurutach, Suronapee Phoomvuthisarn:

REST web service composition: A survey of automation and techniques. 116-121 - Masafumi Katoh, Masahiko Murakami, Akiko Yamada, Masaaki Kawai, Motoyoshi Sekiya, Sumie Morita, Makoto Murakami:

Proposal of a personal agent for human centric information networking: Collaboration of human profile and human context. 122-127 - Napaphat Vichaidis, Hiroshi Tsunoda, Glenn Mansfield Keeni:

Analyzing darknet TCP traffic stability at different timescales. 128-133 - Shin Horie, Hiroaki Higaki:

Wake-up schedule modification for shorter-delay intermittent wireless sensor networks. 134-139 - Takahiro Kawasaki, Yumi Takaki, Tomio Kamada, Chikara Ohta:

A study for improvement of throughput in high-density wireless networks using transmitting opportunity control. 140-145 - Gokce Nur Yilmaz:

Depth perception prediction of 3D video QoE for future internet services. 146-149 - Minsu Kim, Kwangsue Chung:

Quality control scheme based on VBR characteristics for improving QoE of UHD streaming service. 150-155 - Daniel Fraunholz, Hans Dieter Schotten:

Strategic defense and attack in deception based network security. 156-161 - Abigail M. Y. Koay

, Aaron Chen, Ian Welch, Winston K. G. Seah
:
A new multi classifier system using entropy-based features in DDoS attack detection. 162-167 - Trupil Limbasiya

, Arijit Karati
:
Cryptanalysis and improvement of a mutual user authentication scheme for the Internet of Things. 168-173 - Hamza Hammami, Hanen Brahmi, Sadok Ben Yahia

:
Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems. 174-181 - Saad El Jaouhari, Ahmed Bouabdallah, Jean-Marie Bonnin:

A secure WebRTC/WoT-based health-care architecture enhanced with access control. 182-187 - Gaurav Varshney, Sumant Bagade, Shreya Sinha:

Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress. 188-193 - Sangmin Lee, Kuyju Kim, Jina Kang, Hyoungshick Kim:

Bypassing DRM protection in e-book applications on Android. 194-198 - Eline Rietberg, Lucia D'Acunto

, Robert E. Kooij, Hans van den Berg:
Analyzing information availability in ICN under link failures. 199-204 - Samuel Moreira Abreu Araújo, Fernanda S. H. Souza, Geraldo R. Mateus:

Virtual network embedding in multi-domain environments with energy efficiency concepts. 205-210 - Yusuke Igarashi, Toshiaki Miyazaki:

A DTN routing algorithm adopting the "Community" and "Centrality" parameters used in social networks. 211-216 - N. I. Didenko, D. F. Skripnuk, O. V. Mirolyubova, Viktor Merkulov

, V. Sevashkin, Ekaterina Samylovskaya
:
System of econometric equations of the world market of natural gas. 217-222 - Yuki Takei, Zhi Liu

, Susumu Ishihara
:
Effect of channel bonding and parallel data transmission with IEEE802.11n wireless LAN in a small sewer pipe. 223-228 - Hayato Soya, Osamu Takyu, Keiichiro Shirai, Fumihito Sasamori, Shiro Handa, Mai Ohta, Takeo Fujii:

Modified rendezvous scheme with inferring access channel probability of slave by master. 229-234 - Sumika Nishikawa, Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki:

Analysis of message delivery delay in large-scale geographic DTN routing. 235-240 - Natasa Zivic, Christoph Ruland

:
Cognition for enhanced biometrie authentication. 241-244 - Nhu-Ngoc Dao

, Duc-Nghia Vu
, Yunseong Lee, Minho Park, Sungrae Cho
:
MAEC-X: DDoS prevention leveraging multi-access edge computing. 245-248 - Tran Manh Nam, Phan Hai Phong, Tran Dinh Khoa, Truong Thu Huong

, Pham Ngoc Nam, Huu-Thanh Nguyen
, Luong Xuan Thang, Pham Anh Tuan, Le Quang Dung, Vu Duy Loi:
Self-organizing map-based approaches in DDoS flooding detection using SDN. 249-254 - Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:

A method for estimating process maliciousness with Seq2Seq model. 255-260 - Lingyan Xiu, Bojiao Ma, Konglin Zhu, Lin Zhang:

Implementation and optimization of image acquisition with smartphones in computer vision. 261-266 - Oleg A. Kozlov, Dmitriy G. Rodionov

, Liudmilaa A. Guzikova
:
Information security problems in educational institutions in conditions of network interaction. 267-269 - Muhui Yang, Yihua Huang:

OVS-DPDK with TSO feature running under docker. 270-273 - Chung-Ming Huang, Meng-Shu Chiang, Wei-Long Su, Duy-Tuan Dao:

SDN-based V2V offloading for cellular network using the LifeTime-based network state routing (LT-NSR). 274-279 - Ashutosh Bhatia, K. Haribabu

, Kartikeya Gupta, Aakash Sahu:
Realization of flexible and scalable VANETs through SDN and virtualization. 280-282 - Yueping Cai, Jun Liu, Xinwei Fan, Ya Qiu, Bing Tan:

Software defined status aware routing in content-centric networking. 283-288 - Tri-Hai Nguyen

, Trinh Nguyen, Myungsik Yoo:
Analysis of deployment approaches for virtual customer premises equipment. 289-291 - Bala Prakasa Rao Killi, Seela Veerabhadreswara Rao:

Link failure aware capacitated controller placement in software defined networks. 292-297 - Yutaka Onuma, Yoshiaki Terashima, Sumika Nakamura, Ryozo Kiyohara:

A method of ECU software updating. 298-303 - Tatsuro Hara, Ryozo Kiyohara:

Vehicle approaching model for T-junction during transition to autonomous vehicles. 304-309 - Shunsuke Tsurumi, Takeo Fujii:

Reliable vehicle-to-vehicle communication using spectrum environment map. 310-315 - Harsha Vasudev

, Debasis Das
:
A trust based secure communication for software defined VANETs. 316-321 - Hesham El-Sayed, Moumena Chaqfeh

:
The deployment of mobile edges in vehicular environments. 322-324 - Shan Wu, Kai Liu, Wenzhu Zhang, Zhen Xu, Feng Liu, Xiling Luo:

A distributed cooperative MAC protocol with relay collision avoidance for wireless ad hoc networks. 325-330 - Norihiro Naganuma, Kai Osawa, Jun Mashino, Satoshi Suyama, Hiroyuki Otsuka:

Proposal of CQI table switching control method corresponding to 256-QAM for CRE in HetNet. 331-335 - Danish Mehmood Mughal

, Syed Tariq Shah
, Daniyal Munir
, Kwang Hyun Park, Min Young Chung:
Throughput analysis of multi-antenna based SWIPT relay network. 336-340 - Devarani Devarani Devim, Seokjoo Shin:

Outage probability analysis of device-to-device communications with frequency reuse-2 in fractional frequency reuse method. 341-345 - Yi Gong

, Shengchu Wang, Yupeng Zhang, Feng Luo, Lin Zhang:
Exploring LTE-V link level performance by geometry enhanced winner II channel model. 346-351 - Ruxiao Tian, Tomoki Ota, Hiroyuki Otsuka:

Influence of phase error on OFDM-based 4096-QAM with turbo coding. 352-355 - Ameha T. Abebe, Chung Gu Kang:

FTN-based MIMO transmission for efficient coexistence of broadband and sporadic traffics. 356-358 - Jae Won Lee, Chung Gu Kang, Minjoong Rim

:
SINR-ordered cross link interference control scheme for dynamic TDD in 5G system. 359-361 - Akira Kishida, Yoshifumi Morihiro, Takahiro Asai, Yukihiko Okumura:

Cell selection scheme for handover reduction based on moving direction and velocity of UEs for 5G multi-layered radio access networks. 362-367 - Abhishek Joshi

, Sarang Dhongdi, Ankit, K. R. Anupama:
Joint clustering and routing protocol for static 3D wireless sensor networks. 368-373 - Jussi Turkka, Olivia, Myleen Dosado Villaluz, Simon Foo:

Optimization of LTE uplink performance in multivendor heterogeneous networks. 374-379 - Anupam Kumar Bairagi, Nguyen Hoang Tran, Choong Seon Hong

:
A multi-game approach for effective co-existence in unlicensed spectrum between LTE-U system and Wi-Fi access point. 380-385 - Nasim Ravi

, Aysegül Yayimli:
Fair slot assignment in elastic optical networks under dynamic traffic. 386-390 - Debasis Das

:
Secure cloud computing algorithm using homomorphic encryption and multi-party computation. 391-396 - Luc Tidy, Steve Woodhead:

The effect of datagram size and susceptible population on the epidemiology of fast self-propagating malware. 397-401 - Rongfei Wan, Bin Da, Richard Li

, Chuang Wang, Hongpei Li:
Identity based security for authentication and mobility in future ID oriented networks. 402-407 - Balazs Voneki:

Intelligent sensor network for fence protection. 408-413 - Sabah Suhail

, Choong Seon Hong
, Muhammad Ali Lodhi
, Faheem Zafar, Abid Khan
, Faisal Bashir Hussain:
Data trustworthiness in IoT. 414-419 - Ganesh Bellikar, Ashutosh Bhatia, R. C. Hansdah, Sudhanshu Singh:

3TAAV: A three-tier architecture for pseudonym-based anonymous authentication in VANETs. 420-425 - Dongjune Lee, Jaesung Lim, Hoki Baek

:
An airborne communication relay scheme for IEEE 802.11 WLAN based network. 426-431 - Jongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song, Dongho Won:

Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. 432-437 - Chunyi Quan, Jaewook Jung, Hakjun Lee, Dongwoo Kang, Dongho Won:

Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme. 438-441 - Shashi Raj Pandey

, Choong Seon Hong
:
Response driven efficient task load assignment in mobile crowdsourcing. 442-446 - Yun-Hee Son, Kyu-Chul Lee:

Cloud of things based on linked data. 447-449 - Pankaj Kumar Dalela, Pramod Bhave, Pushpender Yadav, Anshul Yadav, Vipin Tyagi:

Beam Division Multiple Access (BDMA) and modulation formats for 5G: Heir of OFDM? 450-455 - Myungwhan Choi, Areeya Rubenecia, Hyo Hyun Choi:

Reservation-based cooperative traffic management at an intersection of multi-lane roads. 456-460 - Thanh Dinh, Younghan Kim:

An efficient improvement potential-based virtual network function selection scheme for reliability/availability improvement. 461-463 - Kenichi Yoshida, Tomonori Manabe:

Video streaming service and CD sales. 464-469 - Yafeng Deng, Young-June Choi:

Broadcast MAC protocol using relative distance for periodic safety messages in vehicular networks. 470-472 - Pinyaphat Tasatanattakool

, Chian Techapanupreeda:
Blockchain: Challenges and applications. 473-475 - Seonjoo Choi, Jaesung Lim, Hoki Baek

:
Weighted frequency hopping control in TDL for coexistence of satellite spectrum. 476-481 - Piyapong Dangkham:

Mobile augmented reality on web-based for the tourism using HTML5. 482-485 - Waqas ur Rahman

, Kwangsue Chung:
An efficient rate adaptation algorithm for streaming over HTTP. 486-491 - Sun Park, JongWon Kim, ByungRae Cha:

Design of marine environment monitoring system based on open source softwares. 492-494 - D. C. Grant:

Distributed detection and response for the mitigation of distributed denial of service attacks. 495-497 - Paul Alvin V. Sacedor, Victor M. Romero

:
An interest-driven peer-to-peer micro-blogging system over delay tolerant networks. 498-503 - Imran A. Zualkernan

, Fadi A. Aloul, Fayiz Basheer, Gurdit Khera, Shruthi Srinivasan:
Intelligent accident detection classification using mobile phones. 504-509 - Haitham Khaled, Md. Munjure Mowla, Iftekhar Ahmad

, Daryoush Habibi
:
A software defined radio based power saving strategy for next generation mobile systems. 510-515 - Md. Shirajum Munir

, Sarder Fakhrul Abedin, Md. Golam Rabiul Alam
, Nguyen Hoang Tran
, Choong Seon Hong
:
Intelligent service fulfillment for software defined networks in smart city. 516-521 - Bokyung Seo, Myungjae Shin, Yeong Jong Mo, Joongheon Kim

:
Top-down parsing for Neural Network Exchange Format (NNEF) in TensorFlow-based deep learning computation. 522-524 - Sujin Oh, HaRim Jung, Ung-Mo Kim:

An efficient processing of range spatial keyword queries over moving objects. 525-530 - Ferdinando Battiati, Girolamo Catania, Lucio Ganga, Giacomo Morabito, Agatino Mursia, Andrea Viola:

CSSS: Cyber security simulation service for software defined tactical networks. 531-533 - Changwoo Kim, Yujeong Oh, Jaiyong Lee:

Latency-based graph selection manager for end-to-end network service on heterogeneous infrastructures. 534-539 - Sun-young Park, Keecheon Kim:

A study on the processing and reinforcement of message digest through two-dimensional array masking. 540-544 - Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said

:
Towards a self-adaptive access control middleware for the Internet of Things. 545-550 - Jongsoek Choi, Yongtae Shin, Sunok Cho:

Study on information security sharing system among the industrial IoT service and product provider. 551-555 - Vishal Maheshwari, Ashutosh Bhatia, Kuldeep Kumar

:
Faster detection and prediction of DDoS attacks using MapReduce and time series analysis. 556-561 - Wonjoo Park, Jeong Woo Son, Sang-Yun Lee, Sun-Joong Kim:

Multi-view topic model learning to generate audience metadata automatically. 562-564 - HyunChul Joh:

Quantitative security analysis of network OSes by fitting VDM and examining CVSS. 565-570 - Jason R. Lee, Shane Richard Canon, Tina Declerck, Brent Draney, David Paul, David Skinner

:
Enhancing supercomputing with software defined networking. 571-576 - Luis Jurado Perez, Joaquin Salvachua Rodriguez:

Simulation of scalability in IoT applications. 577-582 - Milim Lee

, Changkun Park:
A 2.4-GHz VCO using a symmetric layout technique to minimize mismatches in differential signals. 583-585 - Jamila I. Idrisova, Vladimir N. Myasnikov, Aleksey I. Uljanov

, Natalia V. Belina:
Increasing the efficiency of labor protection in the enterprise. 586-588 - Alexey V. Bataev, Dmitriy G. Rodionov

, Ekaterina S. Kosonogova:
Evaluation of efficiency of using bank smart-card in Russian financial institutions. 589-593 - Alexey V. Bataev, Dmitriy G. Rodionov

, Darya A. Andreyeva:
Analysis of world trends in the field of cloud technology. 594-598 - Yahya Al Sawafi, Abderezak Touzene

, Khaled Day
, Nasser Alzeidi:
Toward hybrid RPL based IoT sensing for smart city. 599-604 - Changmin Lee, Duckhee Lee, Jaiyong Lee:

Occupancy-based adaptive dimmable lighting energy management scheme combined with cyber physical system. 605-610 - N. I. Didenko, D. F. Skripnuk, K. N. Kikkas, V. Sevashkin, G. Romashkin, S. V. Kulik:

Innovative and technological potential of the region and its impact on the social sector development. 611-615 - Yonghwi Kim, Sanghyun An, Jungmin So:

Identifying signal source using channel state information in wireless LANs. 616-621 - Daniel S. Demidenko, Ekaterina D. Malevskaia-Malevich

, Yulia A. Dubolazova:
ISO as a real source of funding. Pricing issues. 622-625 - N. I. Didenko, D. F. Skripnuk, K. N. Kikkas, Viktor Merkulov

, G. Romashkin, S. V. Kulik:
The analysis of convergence - Divergence in the development of innovative and technological processes in the countries of the Arctic Council. 626-631 - Madiha Razzaq, Ningombam Devarani Devi

, Seokjoo Shin:
Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size. 632-635 - Tatiana J. Kudryavtseva

, Angi E. Skhvediani
, Arseniy A. Bondarev:
Digitalization of banking in Russia: Overview. 636-639 - Han Bum Lee, Sang Il Kim, Hwa Sung Kim:

A fault management system for NFV. 640-645 - Shingo Nakajima, Toshiki Yamasaki, Koki Matsumoto, Kazuki Uemura, Tomotaka Wada, Kazuhiro Ohtsuki:

Behavior recognition and disaster detection by the abnormal analysis using SVM for ERESS. 646-651 - Dong-Kyu Choi, Joong-Hwa Jung, Seok-Joo Koh

:
Enhanced cluster-based CoAP in Internet-of-Things networks. 652-656 - Joong-Hwa Jung, Dong-Kyu Choi, Seok-Joo Koh

:
Distributed pub/sub model in CoAP-based Internet-of-Things networks. 657-662 - Takahiro Nogiwa, Kouji Hirata:

Identification of TCP congestion control algorithms with convolution neural networks. 663-665 - Akihiro Ikeda, Naoki Akiyama, Toshiaki Miyazaki:

Formal verification for wireless sensor network in consideration of communication errors. 666-670 - Y. A. Makarichev, A. S. Anufriev, Y. N. Ivannikov, N. I. Didenko, A. Gazizulina:

Low - Power wind generator. 671-672 - Anuradha Wickramarachchi, Dulaj Atapattu, Pamoda Wimalasiri, Ravidu Mallawa Arachchi, Gihan Dias:

Use of nomadic computing devices for storage synchronization. 673-678 - Oanh Tran Thi Kim, Nguyen Hoang Tran

, Vandung Nguyen
, Sun Moo Kang, Choong Seon Hong
:
Cooperative between V2C and V2V charging: Less range anxiety and more charged EVs. 679-683 - Seungmin Lee, Soojin Park, Young B. Park:

State diagram based IoT Ecosystem's IoT device conflict problem migration method. 684-688 - Keecheon Kim, Junghyun An, Joseph Yoo:

A design of IL-CyTIS for automated cyber threat detection. 689-693 - Riku Ohmiya, Hiroyasu Obata, Tutomu Murase

:
Optimal placement considering interference in multiple ad hoc networks. 694-699 - Isamu Shimada, Hiroaki Higaki:

Interference of overhearing by eavesdropper nodes for secure wireless ad-hoc networks. 700-705 - Seohee You, Dana Yang, Inshil Doh, Kijoon Chae:

Authorization based on mobile whitelist in devices for device-to-device communications. 706-711 - Sol Jeon, Inshil Doh, Kijoon Chae:

RMBC: Randomized mesh blockchain using DBFT consensus algorithm. 712-717 - Takayuki Ojima, Takeo Fujii:

Resource management for mobile edge computing using user mobility prediction. 718-720 - Kashif Naseer Qureshi

, Faisal Bashir, Abdul Hanan Abdullah:
An energy and link aware next node selection protocol for body area networks. 721-726 - SungSik Park, Young B. Park:

Photovoltaic power data analysis using hierarchical clustering. 727-731 - Lummanee Chanama, Olarn Wongwirat:

A comparison of decision tree based techniques for indoor positioning system. 732-737 - P. Sethu Lakshmi

, M. G. Jibukumar, V. S. Neenu:
Network lifetime enhancement of multi-hop wireless sensor network by RF energy harvesting. 738-743 - Thien-Binh Dang

, Manh-Hung Tran, Duc-Tai Le, Vyacheslav V. Zalyubovskiy, Hyohoon Ahn, Hyunseung Choo:
Trend-adaptive multi-scale PCA for data fault detection in IoT networks. 744-749 - Winai Nadee

, Korawit Prutsachainimmit
:
Towards data extraction of dynamic content from JavaScript Web applications. 750-754 - Xiaoxiao Wu, Li Wang, Shibing Zhang, Guodong Zhang:

Phase-compensation-based cooperative spectrum sensing algorithm for cognitive cloud networks. 755-759 - Mandeep Kumar, Ketan Sabale

, S. Mini, Trilochan Panigrahi:
Priority based deployment of IoT devices. 760-764 - Viet Hoang Vu, Quang Tran Minh, Phu H. Phung:

An airfare prediction model for developing markets. 765-770 - Tetsuya Noguchi, Osamu Takyu, Fumihito Sasamori, Shiro Handa, Takeo Fujii, Tomoaki Ohtsuki

:
Transmit control for secure information sharing in untrusted relay with two antennas. 771-775 - Thi Minh Chau Nguyen, Doan B. Hoang, Thanh Dat Dang:

A software-defined model for IoT clusters: Enabling applications on demand. 776-781 - V. Sreejith, Rutuja Surve, Nikhil Vyas, K. R. Anupama, Lucy J. Gudino:

Area based routing protocol for mobile wireless sensor networks. 782-786 - Ryo Kurosawa, Osamu Takyu, Fumihito Sasamori, Shiro Handa, Mai Ohta, Takeo Fujii:

Experimental study of signaling with IFDMA modulation and nonlinear amplifying for recovering access channel mismatch. 787-790 - Ashis Talukder, Sarder Fakhrul Abedin, Md. Shirajum Munir

, Choong Seon Hong
:
Dual threshold load balancing in SDN environment using process migration. 791-796 - Sriharsha Karamchati, Shatrunjay Rawat, Sudhir Yarram, Guru Prakash Ramaguru:

Mapping mechanism to enhance QoS in IP networks. 797-803 - Litao Guo:

Reliability measures of crossed cube networks. 804-806 - Kyung-Taek Lee, Hyoseok Yoon, Youn-Sung Lee:

Implementation of smartwatch user interface using machine learning based motion recognition. 807-809 - Wonjung Kim, Tae-Yoon Kim, Sohyun Joo, Sangheon Pack:

An opportunistic MAC protocol for full duplex wireless LANs. 810-812 - F. P. Polly, S. K. Shil, Mohammad Arif Hossain

, A. Ayman, Yeong Min Jang:
Detection and classification of HGG and LGG brain tumor using machine learning. 813-817 - Junmin Park, Hyunjae Park, Young-June Choi:

Data compression and prediction using machine learning for industrial IoT. 818-820 - Chang-Mo Yang, Yusik Choo, Sungjoo Park:

Semi-automatic image and video annotation system for generating ground truth information. 821-824 - Kimoon Kang, Hyun-Chool Shin:

EMG based gesture recognition using feature calibration. 825-827 - Jaeyun Lee

, Woo-Jin Song, Hyun-Chool Shin:
EEG binarization for burst suppression segmentation. 828-830 - Changseok Bae, Henry Wing Fung Teung, Yuk Ying Chung:

Effective object tracking framework using weight adjustment of particle swarm optimization. 831-833 - Kiwon Rhee, Hyun-Chool Shin:

Finger motion recognition robust to diverse arm postures using EMG and accelerometer. 834-836 - Inseok Yeo, Hyun-Chool Shin:

Novel Korean finger language recognition using EMG and motion sensors. 837-839 - Hyejin An, Hyun-Chool Shin:

Development of multi-channel brain stimulator. 840-842 - Heemang Song, Hyun-Chool Shin:

A probability model of stationary object using radar time-frequency spectrum. 843-845 - Dat Vuong

, Jaejin Lee, Sun K. Hong
, Won-Yong Shin, Myungsik Yoo:
Interpixel interference mitigation using differential coding in vehicular visible light communication based image sensor. 846-847 - KangYoon Lee, Neul Ha:

AI platform to accelerate API economy and ecosystem. 848-852 - Hyungkeun Lee, Inhye Park:

Performance of a receiver-initiated MAC protocol with aggregation for event-driven wireless sensor networks. 853-856 - Thanh-Tuan Le, Dien Nguyen Van, Eun-Seok Ryu:

Real-time 360-degree video streaming over millimeter wave communication. 857-862 - Youngho Kim, Yun-kyung Lee, Jeongnyeo Kim:

RIPPLE: Adaptive fine-grained access control in multi-hop LLNs. 863-868 - Seehwan Yoo:

Leveraging multicores for mobile edge computing. 869-874 - Andrey Giyenko, Akmaljon Palvanov, Younglm Cho:

Application of convolutional neural networks for visibility estimation of CCTV images. 875-879 - Hwee-Pink Tan

, Austin Zhang:
Real-world large-scale IoT systems for community eldercare: A comparative study on system dependability. 880-885 - Dohyun Kwon, Joongheon Kim

:
Distributed dynamic power-aware buffering for multi-Gbps video streaming in IEEE 802.11ad fast session transfer. 886-890 - Dong-Hyun Lee, Young-Bo Shim, Myoung-Jin Kim, Yeon-Kug Moon:

Hybrid positioning system for improving location recognition performance in offshore plant environment. 891-893 - Dong-Hyun Lee, Young-Bo Shim, Myoung-Jin Kim, Yeon-Kug Moon:

The UWB-based positioning algorithm and H/W development for safety of offshore plant workers. 894-896 - Sunjun Hwang, Kyeong Seon Kim, Yejin Kim, Junhui Kim, Miji Park, SooHyun Park, Joongheon Kim

:
High-dimensional statistical supervised learning for extracting information in steganography. 897-898 - Ali Gohar

, Sanghwan Lee:
A fast remote driver selection mechanism for remote-controlled driving systems. 902-905 - Hyeon Kyu Lee, Young-Seok Choi:

A convolution neural networks scheme for classification of motor imagery EEG based on wavelet time-frequecy image. 906-909 - Minsoo Yeo, Y. Koo, Y. Yoon, T. Hwang, J. Ryu, JaeSeung Song

, Cheolsoo Park:
Flow-based malware detection using convolutional neural network. 910-913 - Heejun Lee

, Youngjoo Kim, Cheolsoo Park:
Classification of human attention to multimedia lecture. 914-916 - W. Seok, Youngjoo Kim, Cheolsoo Park:

Pattern recognition of human arm movement using deep reinforcement learning. 917-919 - Zhenlong Peng, Jian An, Xiaolin Gui, Tianjie Wu, Zhenlong Peng:

PTDU: Public transit system based framework of data upload in urban crowd sensing. 920-925 - Kamrul Hasan

, Seong-Ho Jeong:
CCN-based vehicular communications. 926-929 - Jungsoo Park, Hojin Chun, Souhwan Jung:

API and permission-based classification system for Android malware analysis. 930-935 - Chan Hyeok Lee, Ki-Hyung Kim:

Implementation of IoT system using block chain with authentication and data protection. 936-940 - Jin Hyeong Jeon, Ki-Hyung Kim, Jai-Hoon Kim:

Block chain based data security enhanced IoT server platform. 941-944 - Ilyoung Chong, Sajjad Ali

, Sanghong Lee:
Intelligence provisioning model to support web objects enabled ubiquitous self-directed learning. 945-948 - Junsu Oh, Heemang Song, Hyun-Chool Shin:

Recognition of the upper structure using the RCS characteristic of the automotive radar. 949-952 - Amirul Islam

, Md. Tanvir Hossan
, Mostafa Zaman Chowdhury
, Yeong Min Jang:
Design of an indoor positioning scheme using artificial intelligence algorithms. 953-956 - (Withdrawn) State of the art and challenges facing consensus protocols on blockchain. 957-962

- Yeasom Lee, Wonjae Choi, Bong-Soo Sohn:

Immersive gesture interfaces for 3D map navigation in HMD-based virtual environments. 963-965

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














