Login

Joukov, Nikolai

Information Science and Applications 2017

Joukov, Nikolai - Information Science and Applications 2017, ebook

475,10€

Ebook, PDF with Adobe DRM
ISBN: 9789811041549
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Improving Performance and Energy Efficiency for OFDMA Systems Using Adaptive Antennas and CoMP
Yapeng Wang, Xu Yang, Laurie Cuthbert, Tiankui Zhang, Lin Xiao

2. Privacy in Location Based Services: Protection Strategies, Attack Models and Open Challenges
Priti Jagwani, Saroj Kaushik

3. An Efficient and Low-Signaling Opportunistic Routing for Underwater Acoustic Sensor Networks
Zhengyu Ma, Quansheng Guan, Fei Ji, Hua Yu, Fangjiong Chen

4. A Novel Mobile Online Vehicle Status Awareness Method Using Smartphone Sensors
Dang-Nhac Lu, Thi-Thu-Trang Ngo, Duc-Nhan Nguyen, Thi-Hau Nguyen, Ha-Nam Nguyen

5. A Study on OPNET State Machine Model Based IoT Network Layer Test
Young-hwan Ham, Hyo-taeg Jung, Hyun-cheol Kim, Jin-wook Chung

6. A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks
Xiaofeng Xu, Guangyuan Wang, Yongji Ren, Xiaolei Liu

7. Generating Time Series Simulation Dataset Derived from Dynamic Time-Varying Bayesian Network
Garam Lee, Hyunjin Lee, Kyung-Ah Sohn

8. AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure Network
Nam-Uk Kim, Tai-Myoung Chung

9. Beyond Map-Reduce: LATNODE – A New Programming Paradigm for Big Data Systems
Chai Yit Sheng, Phang Keat Keong

10. Indoor Positioning Solely Based on User’s Sight
Matthias Becker

11. Naming Convention Scheme for Role Based Access Control in Cloud Based ERP Platforms
Abed Alshreef, Lin Li, Wahid Rajeh

12. Korean/Chinese Web-Based Font Editor Based on METAFONT for User Interaction
Minju Son, Gyeongjae Gwon, Jaeyeong Choi

13. A Highly Robust and Secure Digital Image Encryption Technique
Md. Anwar Hussain, Popi Bora, Joyatri Bora

14. Saliency Based Object Detection and Enhancements in Static Images
Rehan Mehmood Yousaf, Saad Rehman, Hassan Dawood, Guo Ping, Zahid Mehmood, Shoaib Azam, Abdullah Aman Khan

15. A Center Symmetric Padding Method for Image Filtering
Mengqin Li, Xiaopin Zhong

16. Implementing a Stereo Image Processing for Medical 3D Microscopes with Wireless HMD
Cheolhwan Kim, Jiyoung Yoon, Yun-Jung Lee, Shihyun Ahn, Yongtaek Park

17. Design of OpenGL SC 2.0 Rendering Pipeline
Nakhoon Baek

18. Saliency Detection via Foreground and Background Seeds
Xiao Lin, Zhixun Yan, Linhua Jiang

19. Identification and Annotation of Hidden Object in Human Terahertz Image
Guiyang Yue, Zhihao Yu, Cong Liu, Hui Huang, Yiming Zhu, Linhua Jiang

20. Information Visualization for Mobile-Based Disability Test Applications
Jongmun Jeong, Seungho Kim, Changsoon Kang, Mintae Hwang

21. Deep Convolutional Neural Networks for All-Day Pedestrian Detection
Xingguo Zhang, Guoyue Chen, Kazuki Saruta, Yuki Terata

22. An Augmented Reality Learning System for Programming Concepts
Kelwin Seen Tiong Tan, Yunli Lee

23. Efficient vCore Based Container Deployment Algorithm for Improving Heterogeneous Hadoop YARN Performance
SooKyung Lee, Min-Ho Bae, Jun-Ho Eum, Sangyoon Oh

24. A Real-Time Operating System Supporting Distributed Shared Memory for Embedded Control Systems
Yuji Tamura, Doan Truong Thi, Takahiro Chiba, Myungryun Yoo, Takanori Yokoyama

25. MBR Image Automation Analysis Techniques Utilizing Emulab
Gibeom Song, Manhee Lee

26. Detection of DNS Tunneling in Mobile Networks Using Machine Learning
Van Thuan Do, Paal Engelstad, Boning Feng, Thanh Do

27. On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function
Chai Wen Chuah, Mustafa Mat Deris, Edward Dawson

28. On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang

29. Physical Layer Security with Energy Harvesting in Single Hop Wireless Relaying System
Poonam Jindal, Rupali Sinha

30. A System Design for the Measurement and Evaluation of the Communications Security Domain in ISO 27001:2013 Using an Ontology
Pongsak Sirisom, Janjira Payakpate, Winai Wongthai

31. Timing Side Channel Attack on Key Derivation Functions
Chai Wen Chuah, Wen Wen Koh

32. A Security Aware Fuzzy Embedded ACO Based Routing Protocol (SAFACO) in VANETs
Hang Zhang, Xi Wang, Dieter Hogrefe

33. Cryptanalysis of “An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System”
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen

34. eDSDroid: A Hybrid Approach for Information Leak Detection in Android
Hoang Tuan Ly, Tan Cam Nguyen, Van-Hau Pham

35. Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis
Nguyen Tan Cam, Van-Hau Pham, Tuan Nguyen

36. Known Bid Attack on an Electronic Sealed-Bid Auction Scheme
Kin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan

37. Perceptual 3D Watermarking Using Mesh Saliency
Jeongho Son, Dongkyu Kim, Hak-Yeol Choi, Han-Ul Jang, Sunghee Choi

38. Perceptual Watermarking for Stereoscopic 3D Image Based on Visual Discomfort
Sang-Keun Ji, Ji-Hyeon Kang, Heung-Kyu Lee

39. Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks
Han-Ul Jang, Hak-Yeol Choi, Dongkyu Kim, Jeongho Son, Heung-Kyu Lee

40. Content Recapture Detection Based on Convolutional Neural Networks
Hak-Yeol Choi, Han-Ul Jang, Jeongho Son, Dongkyu Kim, Heung-Kyu Lee

41. Secret Sharing Deniable Encryption Technique
Mohsen Mohamad Hata, Fakariah Hani Mohd Ali, Syed Ahmad Aljunid

42. Improved 3D Mesh Steganalysis Using Homogeneous Kernel Map
Dongkyu Kim, Han-Ul Jang, Hak-Yeol Choi, Jeongho Son, In-Jae Yu, Heung-Kyu Lee

43. From Sealed-Bid Electronic Auction to Electronic Cheque
Kin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan

44. Enhanced Database Security Using Homomorphic Encryption
Connor Røset, Van Warren, Chia-Chu Chiang

45.
k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF Files
Jaewoo Park, Hyoungshick Kim

46. Reconstruction of Task Lists from Android Applications
Xingmin Cui, Ruiyi He, Lucas C. K. Hui, S. M. Yiu, Gang Zhou, Eric Ke Wang

47. Design and Evaluation of Chaotic Iterations Based Keyed Hash Function
Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang

48. Intellectual Overall Evaluation of Power Quality Including System Cost
Buhm Lee, Dohee Sohn, Kyoung Min Kim

49. A Data-Driven Decision Making with Big Data Analysis on DNS Log
Euihyun Jung

50. A Case-Based Approach to Colorectal Cancer Detection
Pedro Morgado, Henrique Vicente, António Abelha, José Machado, João Neves, José Neves

51. Multi-Modes Cascade SVMs: Fast Support Vector Machines in Distributed System
Lijuan Cui, Changjian Wang, Wanli Li, Ludan Tan, Yuxing Peng

52. Deep Learning Based Recommendation: A Survey
Juntao Liu, Caihua Wu

53. Towards Collaborative Data Analytics for Smart Buildings
Sanja Lazarova-Molnar, Nader Mohamed

54. English and Malay Cross-lingual Sentiment Lexicon Acquisition and Analysis
Nurul Amelina Nasharuddin, Muhamad Taufik Abdullah, Azreen Azman, Rabiah Abdul Kadir

55. A Novel Natural Language Processing (NLP) Approach to Automatically Generate Conceptual Class Model from Initial Software Requirements
Mudassar Adeel Ahmed, Wasi Haider Butt, Imran Ahsan, Muhammad Waseem Anwar, Muhammad Latif, Farooque Azam

56. The Applications of Natural Language Processing (NLP) for Software Requirement Engineering - A Systematic Literature Review
Farhana Nazir, Wasi Haider Butt, Muhammad Waseem Anwar, Muazzam A. Khan Khattak

57. Smart Fetal Monitoring
Jane You, Qin Li, Zhenhua Guo, Ruohan Zhao

58. A Network-Based Approach on Big Data for the Comorbidities of Urticaria
Yi-Horng Lai, Chih-Chiang Ho, Piao-Yi Chiou

59. Application of Automated Theorem-Proving to Philosophical Thought: Spinoza’s Ethics

Maciej Janowicz, Luiza Ochnio, Leszek J. Chmielewski, Arkadiusz Orłowski

60. Improving the B+-Tree Construction for Transaction Log Data in Bank System Using Hadoop
Cong Viet-Ngu Huynh, Jongmin Kim, Jun-Ho Huh

61. Calculate Deep Convolution NeurAl Network on Cell Unit
Haofang Lu, Ying Zhou, Zi-Ke Zhang

62. Stepwise Structure Learning Using Probabilistic Pruning for Bayesian Networks: Improving Efficiency and Comparing Characteristics
Godai Azuma, Daisuke Kitakoshi, Masato Suzuki

63. Differential-Weighted Global Optimum of BP Neural Network on Image Classification
Lin Ma, Xiao Lin, Linhua Jiang

64. Classification Model for Skin Lesion Image
Nontachai Danpakdee, Wararat Songpan

65. Generation of Use Cases for Requirements Elicitation by Stakeholders
Junko Shirogane

66. Smart Learner-Centric Learning Systems
Naseem Ibrahim, Ismail I. K. Al Ani

67. Prioritized Process Test: More Efficiency in Testing of Business Processes and Workflows
Miroslav Bures, Tomas Cerny, Matej Klima

68. Static Testing Using Different Types of CRUD Matrices
Miroslav Bures, Tomas Cerny

69. Extracting Test Cases with Message-Sequence Diagram for Validating the Photovoltaic Energy Integrated Monitoring System
Woo Sung Jang, Bo Kyung Park, Hyun Seung Son, Byung Kook Jeon, R. Young Chul Kim

70. Automatic Test Case Generation with State Diagram for Validating the Solar Integrated System
Bo Kyung Park, Woo Sung Jang, Hyun Seung Son, Keunsang Yi, R. Young Chul Kim

71. Comparison of Software Complexity Metrics in Measuring the Complexity of Event Sequences
Johanna Ahmad, Salmi Baharom

72. Implementation of Ceph Storage with Big Data for Performance Comparison
Chao-Tung Yang, Cai-Jin Chen, Tzu-Yang Chen

73. Predicting Engaging Content for Increasing Organic Reach on Facebook
Natthaphong Phuntusil, Yachai Limpiyakorn

74. Learning Performance Evaluation in eLearning with the Web-Based Assessment
Cheng-Ying Yang, Tsai-Yuan Chung, Min-Shiang Hwang, Cheng-Yi Li, Jenq-Foung JF Yao

75. Improving Teaching and Learning in Southeast Asian Secondary Schools with the Use of Culturally Motivated Web and Mobile Technology
Sithira Vadivel, Insu Song, Abhishek Singh Bhati

76. Game-Based Learning to Teach Assertive Communication ClickTalk for Enhancing Team Play
Bah Tee Eng

77. Cloud Storage Federation as a Service Reference Architecture
Rene Ivan Heinsen, Cindy Pamela Lopez, Tri D. T. Nguyen, Eui-Nam Huh

78. A Study on the IoT Framework Design for Ginseng Cultivation
Kyung-Gyun Lim, Chang-Geun Kim

79. An IPS Evaluation Framework for Measuring the Effectiveness and Efficiency of Indoor Positioning Solutions
Jacqueline Lee Fang Ang, Wai Kong Lee, Boon Yaik Ooi, Thomas Wei Min Ooi

80. An IoT-Based Virtual Addressing Framework for Intelligent Delivery Logistics
Omar Hiari, Dhiah el Diehn I. Abou-Tair, Ismail Abushaikha

81. Context-Aware Security Using Internet of Things Devices
Michal Trnka, Martin Tomasek, Tomas Cerny

82. An Energy-Efficient Transmission Framework for IoT Monitoring Systems in Precision Agriculture
Peerapak Lerdsuwan, Phond Phunchongharn

83. Piezoelectric Voltage Monitoring System Using Smartphone
Nazatul Shiema Moh Nazar, Suresh Thanakodi, Azizi Miskon, Siti Nooraya Mohd Tawil, Muhammad Syafiq Najmi Mazlan

84. A System for Classroom Environment Monitoring Using the Internet of Things and Cloud Computing
Wuttipong Runathong, Winai Wongthai, Sutthiwat Panithansuwan

85. Research on Design of End Site Architecture to Connect LHCONE in KREONET
Chanjin Park, Wonhyuk Lee, Kuinam J. Kim, Hyuncheol Kim

86. A Study of Children Play Educational Environment Based on u-Healthcare System
Minkyu Kim, Soojung Park, Byungkwon Park

87. Virtual Resources Allocation Scheme in ICT Converged Networks
Hyuncheol Kim

88. Enhanced Metadata Creation and Utilization for Personalized IPTV Service
Hyojin Park, Kireem Han, Jinhong Yang, Jun Kyun Choi

89. A Study of Teaching Plan for the Physical Activity Using ICT
Seung Ae Kang

90. Design and Implementation of Headend Servers for Downloadable CAS
Soonchoul Kim, Hyuncheol Kim, Jinwook Chung

91. A Method of Modeling of Basic Big Data Analysis for Korean Medical Tourism: A Machine Learning Approach Using Apriori Algorithm
Jun-Ho Huh, Han-Byul Kim, Jinmo Kim

92. The Study of Application Development on Elderly Customized Exercise for Active Aging
YoungHee Cho, SeungAe Kang, SooHyun Kim, SunYoung Kang

93. Improving Jaccard Index for Measuring Similarity in Collaborative Filtering
Soojung Lee

94. Temperature Recorder System
Suresh Thanakodi, Nazatul Shiema Moh Nazar, Azizi Miskon, Ahmad Mujahid Ahmad Zaidi, Muhammad Syafiq Najmi Mazlan

95. The Emergence of ICTs for Knowledge Sharing Based on Research in Indonesia
Siti Rohajawati, Boy Iskandar Pasaribu, Gun Gun Gumilar, Hilda Rizanti Putri

96. Quality of Transformation of Knowledge as Part of Knowledge Management System
Dyah Budiastuti, Harjanto Prabowo

Keywords: Engineering, Communications Engineering, Networks, Systems and Data Security, Computational Intelligence

Editor
 
Publisher
Springer
Publication year
2017
Language
en
Edition
1
Series
Lecture Notes in Electrical Engineering
Page amount
21 pages
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9789811041549
Printed ISBN
978-981-10-4153-2

Similar titles