


default search action
13th IMIS 2019: Sydney, NSW, Australia
- Leonard Barolli, Fatos Xhafa, Omar Khadeer Hussain:

Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2019), Sydney, NSW, Australia, 3-5 July 2019. Advances in Intelligent Systems and Computing 994, Springer 2020, ISBN 978-3-030-22262-8
The 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2019)
- Osama Alfarraj, Ahmad Ali AlZubi, Salem Alkhalaf

, Thamer Alhussain, Asma AlKhalaf:
Modified Algorithm for Enhancing the Performance of Grid Systems in Task Scheduling. 3-10 - Donald Elmazi

, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based System for Actor Node Selection in WSANS: Simulation and Experimental Results. 11-24 - Seiji Ohara, Admir Barolli, Shinji Sakamoto, Leonard Barolli:

Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Load Balancing and Client Uniform Distribution. 25-38 - Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto:

Performance Evaluation of WMNs by WMN-PSOHC System Considering Random Inertia Weight and Linearly Decreasing Inertia Weight Replacement Methods. 39-48 - Ghulam Hafeez

, Nadeem Javaid
, Muhammad Riaz, Umar Khalid, Zafar Iqbal, Ammar Ali:
An Innovative Model Based on FCRBM for Load Forecasting in the Smart Grid. 49-62 - Shigenari Nakamura

, Tomoya Enokido, Leonard Barolli, Makoto Takizawa
:
Capability-Based Information Flow Control Model in the IoT. 63-71 - Yinzhe Guo, Ryuji Oma, Shigenari Nakamura

, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa
:
Evaluation of a Two-Way Tree-Based Fog Computing (TWTBFC) Model. 72-81 - Wahab Khan

, Hua Wang, Muhammad Ayaz
, Muhammad Shahid Anwar
, Sadique Ahmad
:
A Balanced Energy Efficient (BEE) Routing Scheme for Underwater WSNs. 82-93 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa

:
The Improved Energy Consumption Laxity Based (IECLB) Algorithm to Perform Computation Processes. 94-105 - Tetsuya Shigeyasu:

Effects of Sharing Information for Available Routes by Ad-Hoc Communication on a Disaster Stricken Area. 106-113 - Takeru Kurita, Keita Matsuo, Leonard Barolli:

Design and Implementation of a Weather Measurement System Using Agile-Kanban. 114-124 - Tianhan Gao, Ying Li:

Real-Time Ray Tracing Algorithm for Dynamic Scene. 125-131 - Natwadee Ruedeeniraman, Makoto Ikeda, Leonard Barolli:

TensorFlow: A Vegetable Classification System and Its Performance Evaluation. 132-141 - Noriki Uchida, Goshi Sato, Yoshitaka Shibata:

Image Recognition Based Adaptive Array Antenna Controls for Winter Road Surveillance System in Local Mountain Area. 142-151 - Hamad Balhareth, Alsaleh Saad:

Impact of Mobile Network Operators' Incentive for Public Health: A Study Based on Saudi 2030 Vision. 152-161 - Hongxia Lu, Guidong Zhang, Yongjun Shen:

Cyber Security Situation Prediction Model Based on GWO-SVM. 162-171 - Abdul Basit Majeed Khan, Sajjad Khan

, Sayed Aimal, Mudassar Khan, Bibi Ruqia, Nadeem Javaid
:
Half Hourly Electricity Load Forecasting Using Convolutional Neural Network. 172-184 - Abdul Basit Majeed Khan, Nadeem Javaid

, Orooj Nazeer, Maheen Zahid, Mariam Akbar, Majid Hameed Khan:
Hourly Electricity Load Forecasting in Smart Grid Using Deep Learning Techniques. 185-196 - Han Wang, Xu An Wang

, Shuai Xiao, Zichen Zhou:
Blockchain-Based Public Auditing Scheme for Shared Data. 197-206 - Hyunhee Park:

Classifying Serious Depression Based on Blood Test: A Machine Learning Approach. 207-214 - Myoungsu Kim, Soonhong Kwon, Donald Elmazi

, Jong-Hyouk Lee, Leonard Barolli, Kangbin Yim:
A Technical Survey on Methods for Detecting Rogue Access Points. 215-226 - Wen-Chung Tsai, Nien-Ting Huang, Song-Hao Huang, Ting-Ming Tsai:

An Implementation of LTE MAC-Layer Channel Multiplexing and Scheduling Mechanism Porting Upon an FPGA Embedded System Platform to Support Massive NB-IoT Devices Accesses. 227-235 - Jingling Zhao, Qingyang Bao, Yunze Ni:

Improved SM4 Encryption Algorithm Based on Mixed Congruence Method. 236-245 - Zhongshi Gao, Yang Su, Yi Ding, Yudong Liu, Xu An Wang

, Junwei Shen:
Key Technologies of Anomaly Detection Using PCA-LSTM. 246-254 - Hamida Bano, Aroosa Tahir, Ishtiaq Ali, Raja Jalees ul Hussen Khan, Abdul Haseeb, Nadeem Javaid

:
Electricity Load and Price Forecasting Using Enhanced Machine Learning Techniques. 255-267 - Silvia Angeloni

, Giorgia Pontetti:
RobotFarm: A Smart and Sustainable Hydroponic Appliance for Meeting Individual and Collective Needs. 268-280 - Yi Liu, Leonard Barolli:

A Fuzzy-Based System for Decision of Sightseeing Spots Considering Different Conditions. 281-290 - Shuai Xiao, Xu An Wang

, Han Wang:
Large-Scale Electronic Voting Based on Conflux Consensus Mechanism. 291-299 - Lili Jiao:

An Image Denosing Algorithm for Strong Noise Image Based on Structural Similarity of Contourlet Domain via Grey Relational Analysis. 300-309 - Tomoyuki Ishida, Hayato Ito:

Construction of a Historical Information Visualization System by Superposition of Old Map. 310-318 - Meguru Yamashita, Shingo Sasaki, Akio Doi, Kiwamu Satoh, Hajime Ogawa:

Study on Resistance Parameter Setting of Acupuncture Treatment Training System. 319-325 - Yuchen Liang, Jiangdong Deng, Baojiang Cui:

Bidirectional LSTM: An Innovative Approach for Phishing URL Identification. 326-337 - Yusuke Nozaki, Masaya Yoshikawa:

Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling Attack. 338-347 - Nico Surantha

, Felix Ivan:
Secure Kubernetes Networking Design Based on Zero Trust Model: A Case Study of Financial Service Enterprise in Indonesia. 348-361 - Weiqi Li, Qian Wu, Baojiang Cui:

State-Based Fuzzing for S1AP. 362-372 - Sachula Meng, Zhihui Wang, Huixia Ding, Lili Sun, Delong Yang, Sai Wu, Xinzhi Cao, Xue Wang, Ying Wang, Yuanbin Chen:

Service-Aware Resource Allocation Based on RAN Slicing for Smart Grid. 373-384 - Haidong Kang, Tianhan Gao, Nan Guo:

A Dynamic Scene Recognition Method for Event-Based Social Network. 385-392 - Wenchuan Yang, Yifei Wang, Baojiang Cui, Chen Chen:

A Static Instrumentation Method for ELF Binary. 393-403 - Kunyoung Kim, Minhwan Kim, Jongmo Kim, Mye M. Sohn:

Personalized Topic Graph Generation Method Using Image Labels in Image-Sharing SNS. 404-415 - Cristian Alberoni, Ernesto Leon

, Miguel A. Wister
, José Adán Hernández-Nolasco
:
Wireless Sensor Network to Collect Training Data from Cycling. 416-425
The 13th International Workshop on Advances in Information Security (WAIS-2019)
- Alsaleh Saad, Hassan Kasim Haridi

, Alzabin Sulaiman, Talal Alzabni:
The Impact of Patients' Trust and Privacy on Use of Medical Mobile Applications. 429-436 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen

, Jouni Isoaho
:
Conceptual Security System Design for Mobile Platforms Based on Human Nervous System. 437-446 - Kazuki Ikegami, Michihiro Yamada, Hiroaki Kikuchi, Koji Inui:

Development of a Cyber Incident Information Crawler. 447-455 - Avirup Dasgupta, Asif Qumer Gill

, Farookh Khadeer Hussain:
A Review of General Data Protection Regulation for Supply Chain Ecosystem. 456-465 - Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:

Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding. 466-476 - Takamichi Saito, Rikita Koshiba:

Examination and Comparison of Countermeasures Against Web Tracking Technologies. 477-489
The 9th International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS-2019)
- Kun-Lin Tsai

, Fang-Yie Leu, Shuo-Wen Chang, Jiun-Yi Lin, Huei-Tang Luo:
A LoRaWAN Based Energy Efficient Data Encryption Method. 493-502 - Sheng-Zheng Lin, Fang-Yie Leu:

Firewall Services Provided by Edge Computers Under AMF and gNB in 5G. 503-513 - Fang-Yie Leu, Jia-Sheng Ho:

Air Pollution Source Identification by Using Neural Network with Bayesian Optimization. 514-524 - Mei-Yu Wu, Fang-Yie Leu:

MIH and CRRM Handover in Trusted or Untrusted Environments. 525-536 - Tin Maung Maung, Mie Mie Su Thwin:

Applicable Dynamic Forensics Investigation via Client-Server Architecture with MYANFOSIS. 537-545
The 9th International Workshop on Intelligent Techniques and Algorithms for Ubiquitous Computing (ITAUC-2019)
- Bibi Ruqia, Nadeem Javaid

, Altaf Husain, Najeeba Muhammad Hassan, Hafiza Ghulam Hassan, Yumna Memon
:
Influential Reasonable Robust Virtual Machine Placement for Efficient Utilization and Saving Energy. 549-561 - Hsing-Chung Chen, Tzu-Ya Chen, Shian-Shyong Tseng, Kang-Ming Chang, Fengming Chang, Mei-He Jiang:

The Hot Security Topics Analysis for the Announcements in ICANN Website by Using Web Crawler and Association Rule Technology. 562-571 - Shian-Shyong Tseng, Shih-Nung Chen, Tsung-Yu Yang, Edgar Chia-Han Lin:

Using CBR Approach to Enhance Collaborative Design Ability. 572-586 - Wen-Chung Tsai, Nien-Ting Huang, Ting-Ming Tsai, Te-Jen Wang:

Performance Evaluations of Packet Encapsulation Using Scatter-Gather Direct Memory Access to Support Massive Devices Accesses for NB-IoT Small Cell. 587-596 - Jianghua Cheng, Tong Liu, Yueyong Zhou, Yanye Xiong:

Road Junction Identification in High Resolution Urban SAR Images Based on SVM. 597-606
The 9th International Workshop on Future Internet and Next Generation Networks (FINGNet-2019)
- Kyungmin Lee, Hyunhee Park:

Malicious Adware Detection on Android Platform using Dynamic Random Forest. 609-617 - Hsing-Chung Chen, Bambang Irawan

, Chieh-Yang Shih, Cahya Damarjati
, Zon-Yin Shae, Fengming Chang:
A Smart Contract to Facilitate Goods Purchasing Based on Online Haggle. 618-628 - Yong-Hwan Lee, Wan-Bum Lee:

Object Detection and Tracking Based on Deep Learning. 629-635 - DaEun Park, Jongmo Kim, Mye M. Sohn:

Serendipity-Based Recommendation Framework for SNS Users Using Tie Strength and Relation Clustering. 636-645
The 8th International Workshop on Frontiers in Innovative Mobile and Internet Services (FIMIS-2019)
- Kanji Nakano, Noriki Uchida:

Proposal of QoS Controls by Using OpenFlow for Heterogeneous Wireless Networks Considered with the IoT Traffic Performance. 649-657 - Tianhan Gao, Song Zhou:

Emotion Recognition Scheme via EEG Signal Analysis. 658-663 - Haoyu Ji, He Xu:

A Review of Applying Blockchain Technology for Privacy Protection. 664-674 - Jingmei Zhao, Rui Chen:

Side Information Generation Algorithm Based on Weighted KSVD Dictionary. 675-681 - Hong-Mei Huang:

Controlled Quantum Dialogue Based on Logical Qubits. 682-690
The 8th International Workshop on Sustainability Management of e-Business and Ubiquitous Commerce Engineering (SMEUCE-2019)
- Shyh-Weir Tzang

, Chun-Ping Chang, Yong Zulina Zubairi, Yung-Shun Tsai:
Residual Reversal Strategy: Empirical Evidence in the Taiwan Stock Market. 693-707 - Chun-Ping Chang, Yung-Shun Tsai, Sheena Kaur, Shyh-Weir Tzang

:
Free Cash Flow and Firm Value. 708-716 - Shyh-Weir Tzang, Munkhzaya Usukhjargal, Chun-Ping Chang:

Social Impact Bonds (SIBs): Introduction and Cases Review. 717-726 - Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang

:
Demographic Structure, Business Fluctuations, Tax Shock and Housing Bubbles. 727-737 - Kuei-Yuan Wang, Ying-Li Lin, Chien-Kuo Han, Yu-Sin Huang:

The Causes and Influences of Institutional Investors Herding Behavior in the Taiwan Stock Market. 738-748 - Mei-Hua Huang, Onnavia Laura, Bae-Ling Chen, Chiung-Yen Chen:

International Students' Career Intention-Resource Based View. 749-757 - Mei-Hua Liao, Hidekazu Sone:

Do Institutional Investors like Local Longevity Companies? 758-761 - Ying-Li Lin, Kuei-Yuan Wang, Mei-Lien Chen:

Key Success Factors of Online Learning Website A - Balanced Scorecard Perspective. 762-770 - Chai-Ju Lu, Chiou-Shya Torng:

Exploring the Design of Forestry Experience Activities by IPA. 771-780 - Shu-Chuan Lin, Chung-Hao Chen:

A Model of Chain Restaurant Organizational Achievement in Taiwan: A Structural Equation Modeling Approach. 781-790 - Ya-Lan Chan:

A Deterministic Multi-item Inventory Model with Limited Warehouse Capacity. 791-802 - Shao-Chieh Lin, Jen-Son Cheng, Shieh-Liang Chen, Chia-Ju Lu:

Innovation Strategy of Productive Farm - A Case on Taiwan Mushroom Industry. 803-812
The 7th International Workshop for Practical Issues on Security in Public Internet Services (PISPIS-2019)
- Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, Sun-Young Lee:

Novel Encryption Method of GPS Information in Image File Using Format-Preserving Encryption. 815-823 - Hyeongmin Park, Taeeun Kim, Gaeul Kim, Wonyoung Jang, Kyungroul Lee, Sun-Young Lee:

Improvement of QR Code Access Control System Based on Lamport Hash Chain. 824-833 - Kwangjun Kim, HeeDong Yang

, Byeonggeun Son, Hanjae Yoon, Kangbin Yim, Manhee Lee:
A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities. 834-844 - Junghoon Park, Byeonggeun Son, Junyoung Park, Myoungsu Kim, Kangbin Yim:

Unintended Certificate Installation into Remote IoT Nodes. 845-854
The 1st International Workshop on Optical Communication and Computing (OCC-2019)
- S. Ramya

, T. S. Indumathi:
Optimizing the Placement of Wavelength Converters in WDM. 857-867 - Somesh Nandi, T. S. Indumathi, R. V. Sai Priya, Aparna Kori:

Analysis of Fiber Bragg Grating Spectral Characteristics Using Couple Mode Theory for Sensor Applications. 868-879 - Tejasrikumar Kori, Amogh Kori, Akshata S. Kori

, Somesh Nandi:
A Study on Fiber Bragg Gratings and Its Recent Applications. 880-889 - P. C. Shruthi, T. S. Indumathi, K. C. Jagadeesh:

Maximizing the Placement of Wavelength Converters in WDM Optical Networks Using Adaptive Equal Opportunity Genetic Algorithm. 890-901 - Harshada J. Patil, T. S. Indumathi, Preeta Sharan

, Somesh Nandi:
Interpretation of Photonic Crystals with Hexagonal Symmetry. 902-912

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














