


default search action
ICISA 2018: Hong Kong, China
- Kuinam J. Kim, Nakhoon Baek:

Information Science and Applications 2018 - ICISA 2018, Hong Kong, China, June 25-27th, 2018. Lecture Notes in Electrical Engineering 514, Springer 2019, ISBN 978-981-13-1055-3
Ubiquitous Computing
- Afizan Azman, Sumendra Yogarayan, Samuel Leong Wei Jian, Siti Fatimah Abdul Razak

, Kirbana Jai Raman, Mohd Fikri Azli Abdullah
, Siti Zainab Ibrahim, Anang Hudaya Muhamad Amin
, Kalaiarasi Sonai Muthu:
A Study of Wireless Communication Technologies for Vehicular Communication. 3-13 - Jinhyuck Kim

, Hyun Jin Kim
:
A New Fractional Binary-to-Decimal Number Conversion for Errorless Calculation. 15-21 - Yun-Hong Noh, Ji-Yun Seo, Do-Un Jeong:

Development of Distraction Limit Estimation Index Using Posture Change Monitoring System. 23-29 - Ji-Yun Seo, Yun-Hong Noh, Do-Un Jeong:

Implementation of Rehabilitation Assistant System Based on Movement and Muscle Activity Information. 31-37
Networks and Information Systems
- Zhiqiang Zou, Junjie Xiong, Xu He, Haihong Dai:

NUPT ST-Data Miner: An Spatio-Temporal Data Analysis and Visualization System. 41-51 - Feng-Hsiag Hsiao, Po-Han Lin:

Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based Approach. 53-66 - Patrick Von Angelo V. Atienza, William Emmanuel S. Yu:

A Framework for Performance Analysis of Various Load Balancing Techniques in a Software-Defined Networking Environment. 67-74 - Fauqia Ilyas, Farooque Azam

, Wasi Haider Butt
, Kinza Zahra:
Inferring Social Relationships Through Network: A Systematic Literature Review. 75-87 - Hyuncheol Kim:

Extended Flow Detection Scheme Using Simple Processor Trace (PT). 89-95 - Kyungock Yi, Hyeonjung Oh:

The Effect of Wearing the Customized Insole on the Coordination of the Right and Left Wrists Measured by Wearables During Golf Swing. 97-108 - SeungAe Kang:

A Study on Development of Application for Management of Obesity in Children with Intellectual Disabilities. 109-114 - Minkyu Kim, Soojung Park, ByoungKwon Park

:
A New Paradigm for Spectator Sports in Application of Media. 115-121 - Sunyoung Kang, Seungae Kang:

Physical Activity Intervention Platform for the Elderly with Mild Cognitive Impairment. 123-128
Multimedia and Visualization
- Nakhoon Baek

:
A Simplified Emulation Scheme for OpenGL SC 2.0 Rendering over OpenGL Embedded Systems 2.0. 131-135 - Kyusik Park

:
Robust Sound Localization Algorithm for Intelligent Acoustic Surveillance System. 137-147 - Yongseok Chi:

A Multiple Optical Vision System of Virtual Display. 149-155 - Afizan Azman, Kirbana Jai Raman, Imran Artwel Junior Mhlanga, Siti Zainab Ibrahim, Sumendra Yogarayan, Mohd Fikri Azli Abdullah

, Siti Fatimah Abdul Razak
, Anang Hudaya Muhamad Amin
, Kalaiarasi Sonai Muthu:
Real Time Driver Anger Detection. 157-167 - Woo Suk Shin

, Nakhoon Baek
:
Debug Output Features for OpenGL SC 2.0 Safety Critical Profile. 169-173 - Zibusiso Bhango, Dustin van der Haar:

Eigennose: Assessing Nose-Based Principal Component Analysis for Achieving Access Control with Occluded Faces. 175-183
Middleware and Operating Systems
- Cheol-Hong Moon:

Implementation of a Monitoring System for the Measurement of Temperature, Flow Rate, and Fluid Pressure of Cooling Systems. 187-197
Security and Privacy
- Kudzaishe Mhou, Dustin van der Haar:

A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems. 201-209 - Mohd Fadzil Abdul Kadir, Mohamad Afendee Mohamed, R. Mohamad, M. Mamat, Abdullah Muhammed

:
Performance Comparison of Some Addition Chain Methods Based on Integer Family. 211-218 - Kennedy Okokpujie, Etinosa Noma-Osaghae

, Olatunji Okesola, Osemwegie Omoruyi
, Chinonso Okereke
, Samuel John
, Imhade P. Okokpujie
:
Integration of Iris Biometrics in Automated Teller Machines for Enhanced User Authentication. 219-228 - Kennedy Okokpujie, Etinosa Noma-Osaghae

, Olatunji Okesola, Osemwegie Omoruyi
, Chinonso Okereke
, Samuel John
, Imhade P. Okokpujie
:
Fingerprint Biometric Authentication Based Point of Sale Terminal. 229-237 - Imano Williams, Xiaohong Yuan:

A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns. 239-249 - Tao Feng, Xiaoyu Yin, Chunyan Liu:

An Efficient and Anonymous KP-ABE Scheme with Keyword Search. 251-258 - Norman Wilde, Lauren Jones, Robert Lopez, Travis Vaughn:

A DNS RPZ Firewall and Current American DNS Practice. 259-265 - Kwangjun Kim, Manhee Lee:

SNMP-Based Detection of VLAN Hopping Attack Risk. 267-272 - Nikhil Mewalal, Wai Sze Leung

:
Improving Hidden Message Extraction Using LSB Steganalysis Techniques. 273-284 - Hsin-Ying Liang, Cheng-Ying Yang, Min-Shiang Hwang:

Secrecy Analysis in the AF Mode Cooperative Communication System. 285-293 - Min-Shiang Hwang, Hung-Wei Yang, Cheng-Ying Yang:

An Improved Hou-Wang's User Authentication Scheme. 295-301 - Anton Miguel Suba, Kurt Vincent Bautista, Julio Carlos Tomas Ledesma, William Emmanuel Yu:

Developing a Testing Framework for Intrusion Detection Algorithms Using Software Defined Networking. 303-313
Data Mining and Artificial Intelligence
- Margaux Fourie, Dustin van der Haar:

Ballet Pose Recognition: A Bag-of-Words Support Vector Machine Model for the Dance Training Environment. 317-325 - Jihyun Byun, Dustin van der Haar:

Pronunciation Detection for Foreign Language Learning Using MFCC and SVM. 327-335 - Angela Siew-Hoong Lee

, Ka Leong Daniel Chong, Nicholas Khin-Whai Chan:
OpinionSeer: Text Visualization on Hotel Customer Reviews of Services and Physical Environment. 337-349 - Tevin Moodley

, Dustin van der Haar:
Comparisons in Drinking Water Systems Using K-Means and A-Priori to Find Pathogenic Bacteria Genera. 351-359 - Jongmun Jeong, Larsson Bajracharya, Mintae Hwang:

Optimal Lightweight Cryptography Algorithm for Environmental Monitoring Service Based on IoT. 361-367 - Matthias Becker

, Sinan Balci:
Improving an Evolutionary Approach to Sudoku Puzzles by Intermediate Optimization of the Population. 369-375 - Martin Kotyrba

, Eva Volná
, Jakub Gaj:
Saturated Flow Method for Traffic Optimization in Ostrava City. 377-387 - Jan Konvicka, Martin Kotyrba

, Eva Volná
, Hashim Habiballa
, Vladimír Bradác:
Adaptive Control of EV3 Robot Using Mobile Devices and Fuzzy Logic. 389-399 - Ying Shen

, Qiang Zhang, Jin Zhang, Jiyue Huang, Yuming Lu, Kai Lei
:
Improving Medical Short Text Classification with Semantic Expansion Using Word-Cluster Embedding. 401-411 - Juntian Lin, Guan Luo

, Zhu Zhan, Xiaoyao Guan:
A Deep Learning Approach to Mining the Relationship of Depression Symptoms and Treatments for Prediction and Recommendation. 413-422 - Euihyun Jung:

A Bayesian Network Approach for Discovering Variables Affecting Youth Depression. 423-430 - Xu Yang

, Zheqi Zhang, Laurie G. Cuthbert
, Yapeng Wang:
Forecasting Macao GDP Using Different Artificial Neural Networks. 431-442 - Nutthisara Choolikhit, Wararat Songpan

, Monlica Wattana, Ngamnij Arch-int:
Edge Detection and Symmetry Method for Cleft Lip and Palate Children Using Image Processing. 443-455 - Hung Nguyen Ngoc, Jaeyoung Kim, Jong-Myon Kim:

An Effective Envelope Analysis Using Gaussian Windows for Evaluation of Fault Severity in Bearing. 457-464 - Shuting Guo, Zheng Liu, Wenyan Chen, Tao Li:

Event Extraction from Streaming System Logs. 465-474 - Fokrul Alom Mazarbhuiya

, Mohammed Yahya Alzahrani
, Lilia Georgieva:
Anomaly Detection Using Agglomerative Hierarchical Clustering Algorithm. 475-484 - Kinza Zahra, Farooque Azam

, Wasi Haider Butt
, Fauqia Ilyas:
User Identification on Social Networks Through Text Mining Techniques: A Systematic Literature Review. 485-498 - Timothy Callemein

, Kristof Van Beeck, Geert Brône
, Toon Goedemé
:
Automated Analysis of Eye-Tracker-Based Human-Human Interaction Studies. 499-509
Software Engineering
- Tomás Cerný

, Michael Jeff Donahoo:
Survey on Compromise-Defensive System Design. 513-521 - Larsson Bajracharya, Tirta Mulya, Ayi Purbasari, Mintae Hwang:

A Study on Cost-Effective and Eco-friendly Bicycle Sharing System for Developing Countries. 523-531 - Zhiyi Ma, Jinyang Liu, Xiao He:

An Approach to Modeling Microservice Solutions. 533-542 - Bilal Maqbool, Farooque Azam

, Muhammad Waseem Anwar
, Wasi Haider Butt
, Jahan Zeb, Iqra Zafar, Aiman Khan Nazir, Zuneera Umair
:
A Comprehensive Investigation of BPMN Models Generation from Textual Requirements - Techniques, Tools and Trends. 543-557 - Khaled Hamdan, Boumediene Belkhouche, Peter Smith:

A Culture-Based Profile Model of Software Evaluators. 559-570 - Kitti Kredpattanakul, Yachai Limpiyakorn

:
Transforming JavaScript-Based Web Application to Cross-Platform Desktop with Electron. 571-579 - Jirí Sebek, Petr Vondrus, Tomás Cerný

:
Degree of Similarity of Root Trees. 581-591
Web Technology
- Seung-Mo Je, Jun-Ho Huh

:
Nash Equilibrium Solution for Communication in Strategic Competition Adopted by Zigbee Network for Micro Grid. 595-606 - L. G. Pee

:
Affordances for the Sharing of Domain-Specific Knowledge on Enterprise Social Media. 607-613
Internet of Things
- Seung Ho Kim, Han Guk Ryu, Chang Soon Kang:

Development of an IoT-Based Construction Site Safety Management System. 617-624 - Miroslav Bures

, Tomás Cerný
, Bestoun S. Ahmed
:
Internet of Things: Current Challenges in the Quality Assurance and Testing Methods. 625-634 - Michal Trnka, Filip Rysavy, Tomás Cerný

, Nathaniel Stickney:
Using Wi-Fi Enabled Internet of Things Devices for Context-Aware Authentication. 635-642 - Chayoung Kim, Hye-young Kim:

A Hybrid Deep Q-Network for the SVM Lagrangian. 643-651 - Chayoung Kim, Jung-Min Park, Hye-young Kim:

An Actor-Critic Algorithm for SVM Hyperparameters. 653-661 - Jin-uk Jung, A. M. Ilham, Mintae Hwang, Kyo-Hong Jin:

Design of the Manufacturing Facility Maintenance Systems Based on Internet of Things. 663-673 - Endah Kristiani

, Chao-Tung Yang
, Yuan-Ting Wang, Chin-Yin Huang
:
Implementation of an Edge Computing Architecture Using OpenStack and Kubernetes. 675-685 - Lei Hang

, Do Hyeun Kim:
Enabling Cross-Domain IoT Interoperability Based on Open Framework. 687-691

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














