


default search action
ICIT 2018: Hong Kong, China
- Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, December 29-31, Hong Kong, China. ACM 2018, ISBN 978-1-4503-6629-8

Computer Theory and Application
- Wenjie Li, Hua Xue:

A Clustering Algorithm Based on Weighted Distance and User Preference of Incorporating Time Factors. 1-6 - Jawairia Rasheed, Usman Akram, Ahmed Kamran Malik:

Terrorist Network Analysis and Identification of Main Actors Using Machine Learning Techniques. 7-12 - Thanuja Chandani Sandanayake

, G. A. I. Limesha, T. S. S. Madhumali, W. P. I. Mihirani, M. S. A. Peiris:
Automated CV Analyzing and Ranking Tool to Select Candidates for Job Positions. 13-18 - Patsaraporn Somboonsak:

Misspelling Error Detection in Thai Language Application. 19-24 - Chiliang Zhang, Zhimou Yang, Zuochang Ye:

Detecting Adversarial Perturbations with Salieny. 25-30 - Jennifer O. Contreras, Melvin A. Ballera

, Ace C. Lagman
, Jennalyn G. Raviz:
Lexicon-based Sentiment Analysis with Pattern Matching Application using Regular Expression in Automata. 31-36
Software Design and Data Engineering
- Wei-Zhong Yan, Jia Kang, Ding-Wen Zhang:

Measure and Analysis of Influence Factors of Inbound Tourism Level in Shaanxi Based on Panel Data Model. 37-41 - Youyung Hyun, Ryuichi Hosoya, Taro Kamioka:

The Implications of Big Data Analytics Orientation upon Deployment. 42-48 - Kai Sheng Teong, Yong En Tan, Mehlam Shabbir, Sook-Ling Chua

, Lee Kien Foo
:
Finding Insights through Interactive Visualization. 49-53 - Yonghong Li, Shuwen Zhang, Nan Jia:

Research on the Transformation and Upgrading Path and Selection of Traditional Industries from the Perspective of Big Data. 54-59 - Murni Fatehah

, Vitaliy Mezhuyev
:
Design and Process Metamodels for Modelling and Verification of Safety-Related Software Applications in Smart Building Systems. 60-64 - Xiaohan Qiu, Hua Jing, Wei Zhang:

Application of an Improved Combinatorial Test Strategy in Test Case Generation for Aviation Software. 65-69 - Wilver Auccahuasi

, Grisi Bernardo Santiago, Elizabeth Oré Núñez
, Fernando Sernaque:
Interactive online tool as an instrument for learning mathematics through programming techniques, aimed at high school students. 70-76 - Qi Li, ZhiCheng Ma, Shibo Yang, Xianbo Li, Zhixin Ma, Xinlei Wei:

Reconstruct the Scope, Content and Approaches of Computational Linguistics. 77-81 - Lanying Guo, Chao Peng, Cheng He:

New Reversible Computing Algorithms for Shortest Paths Problem. 82-87
Information Security and Encryption
- Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen

:
On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. 88-91 - Ali Md. Arshad, Yuta Kodera, Shoji Heguri, Takuya Kusaka, Satoshi Uehara, Robert H. Morelos-Zaragoza

:
Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field. 92-96 - Monther Aldwairi, Mohammad A. Alshboul

, Asmaa Seyam:
Characterizing Realistic Signature-based Intrusion Detection Benchmarks. 97-103 - Gongliang Wang, Zhenguo Yang, Junhong Chen, Kanoksak Wattanachote, Wenyin Liu:

Security Mechanism Improvement for 2D Barcodes using Error Correction with Random Segmentation. 104-109 - Xinman Zhang, Jiayu Zhang, Tingting He, Lydia Yiyu Chen, Yuanjun Shen, Xuebin Xu:

A Speech and Lip Authentication System Based On Android Smart Phone. 110-114
Cloud Computing and IoT Applications
- Godwin S. Monserate

, Juliet S. Mendez:
Adaptive Network Tools and Services Network Topology Mapper. 115-119 - Sumathi Balakrishnan, Hemalata Vasudavan, Raja Kumar Murugesan

:
Smart Home Technologies: A Preliminary Review. 120-127 - Sarawut Ramjan:

Conceptual Framework of a Fuzzy Logic Forecasting Decision-Support System for Diaper Purchase to be Used in an Internet of Things environment. 128-133 - Zakariya Ammar, Ahmad Alsharif:

Deployment of IoT-based honeynet model. 134-139 - Mohammed M. Alani

:
IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks. 140-144 - Moussa Witti, Dimitri Konstantas:

A Secure and Privacy-preserving Internet of Things Framework for Smart City. 145-150 - Hemalata Vasudavan, Kamalanathan Shanmugam

, Harith Abdilaziz Ahmada:
User Perceptions in Adopting Cloud Computing in Autonomous Vehicle. 151-156 - Reynaldo R. Corpuz

, Bobby D. Gerardo
, Ruji P. Medina
:
Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing. 157-162 - Huafei Zhu, Wee Keong Ng:

Sustainable Data Management Strategies and Systems in Untrust Cloud Environments. 163-167
Image Processing
- Kunlei Jing, Xinman Zhang, Xuebin Xu:

An Overview of Multimode Biometric Recognition Technology. 168-172 - Xun Liang, Yanni Shi, Xiaoyu Zhan:

Fatigue Driving Detection Based on Facial Features. 173-178 - Florence Jean B. Talirongan, Ariel M. Sison, Ruji P. Medina

:
An MD5-Hirose Hashing Algorithm for Digital Image Watermarking. 179-183 - Man-Sheng Chen, Dong Huang

, Mingkai He, Chang-Dong Wang:
Ensemble Clustering by Noise-Aware Graph Decomposition. 184-188 - Jianying Wang, Shi Fei, Zhao Qiang:

Application of Binocular Vision Algorithm Based on Angle Measuring in Moving Target Tracking System. 189-193 - Wenbi Rao, Yongqiang Tan, Yao Tan:

Video Content Annotation Method Based on Multi-weight Multi-source Transfer Learning. 194-198 - Aleta C. Fabregas, Debrelie Cruz, Mark Daniel Marmeto:

SUGPO: A White Spot Disease Detection in Shrimps Using Hybrid Neural Networks with Fuzzy Logic Algorithm. 199-203 - Hendry

, Rung-Ching Chen:
A New Method for License Plate Character Detection and Recognition. 204-208 - Xinman Zhang, Qi Xiong, Xuebin Xu, Zhiyuan Ma:

Single Biometric Recognition Research: A Summary. 209-213 - Hidear Talirongan, Ariel M. Sison, Ruji P. Medina

:
A New Advanced Encryption Standard-Butterfly Effect in Protecting Image of Copyright Piracy. 214-218
Modern Information Theory and Technology
- I-Ching Lin, Han-Chi Fu, Sheng-Hung Chang, Kaijun Leng:

An Evaluation Model Based on Product Characteristics for End-Delivery Choice in China e-Commerce Services. 219-223 - Wei Quan, Zheng Chen, Xiaohua Tony Hu:

BANN: A Framework for Aspect-Level Opinion Mining. 224-228 - Shivam Kumar, Nersisson Ruban

:
Smart Healthcare Expert System with Medicine Dispenser. 229-234 - Dorota Jelonek

:
Self-Assessment of the Maturity of Management Information Systems-Business Alignment. 235-239 - Xikai Tang, Zepeng Gong:

A Comparative Study of Broadband Policy between China and the United States: Based on a "Tool-Welfare" Analysis Framework. 240-244 - Supparang Ruangvanich

, Prachyanun Nilsook
:
Personality Learning Analytics System in Intelligent Virtual Learning Environment. 245-250 - K. Dinesh, R. Subramanian, Ibrahim Dweib

, M. Nandhini
, Mohamed Yasin Noor Mohamed, Rajakumar Ramalingam
:
Bi-Directional Self-Organization Technique for Enhancing the Genetic Algorithm. 251-255 - Rimpei Kunimoto, Hiroyuki Hisamatsu:

Proposal for a Course Support System for Database Exercises. 256-260 - Zhaopeng Xu, Jinpei Li, Runfei Li, Ye Tian, Peng Du, Zhongbao Feng:

Fault Feature Extraction of Wind Turbine Gearbox Based on Improved Singular Value Decomposition and Noise Reduction. 261-266 - Ace C. Lagman

, Melvin A. Ballera
, Jennifer O. Contreras, Jennalyn G. Raviz:
Development of Converted Deterministic Finite Automaton of Decision Tree Rules of Student Graduation and Adaptive Learning Environment. 267-271 - Jun Yan, Yusheng Xu, Jingyi Zhang:

Overlapping community detection based on contribution value improved SLPA. 272-277 - Dehong Qiu, Pin Zhang, Shaohong Fang, Xuwen Lang, Hao Feng:

Discovering Dependence across Traffic Data of Disparate Regions Using Multiscale Generalized Correlation. 278-283
Electronic Information and Control System
- Guangyin Jin, Jincai Huang, Yang-He Feng, Guangquan Cheng, Zhong Liu, Qi Wang:

Addressing the Task of Rocket Recycling with Deep Reinforcement Learning. 284-290 - Carlo Garing Inovero

:
Forecasting Supplies Inventory Using Sequential Pattern Analysis. 291-294 - John Carlo Q. Agetano, Niña Angela T. Pamplona, Genoah Lee Hernia, Ingrid Carissa C. Obnial, Eugenia R. Zhuo

:
Amaize: Automated Maize Seed Sowing Robot with Android Mobile Application. 295-300 - Sang-Woo Seo, Myunggyu Kim, Yejin Kim:

Efficient Sound-source Localization Method based on Direction Estimation using 2D Microphone Array. 301-306 - Twinkle Mae C. Gatbonton, Betchie E. Aguinaldo:

Employability Predictive Model Evaluator Using PART and JRip Classifier. 307-310 - Hong-wei Ma, Jianhui Wu:

An Analysis of the Anti-aliasing Property of Continuous Time ΣΔ Modulators from perspective of Time Domain. 311-315 - Junghoon Lee, Gyung-Leen Park:

Charger reservation scheme for electric vehicles based on stable marriage problem adaptation. 316-319 - Qing Wu, Weigang Xu, Weijun Huang:

Applications of An Improved Electromagnetism-like Mechanism Algorithm in Optimization of Processing Parameters. 320-325 - Yudong Du, Yunhong Zhou, Aimin Zhang, Yang Yu, Weipeng Yang, Hang Zhang:

The Design and Implementation of Control Strategy and Power Modular for STATCOM Application. 326-332

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














