Joukov, Nikolai
Mobile and Wireless Technologies 2017
1. A Lightweight Mutual Authentication Protocol for the IoT
Mohamed Tahar Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet
2. Improving Consumers’ Value and Satisfaction Towards Recreational Facilities Through Apps
Norfaradilla Wahid, Fathin Najwa Masnan, Hanayanti Hafit, Shahreen Kasim
3. N-LibSys: Library System Using NFC Technology
See Pui Mun, Mohd Heikal Husin, Manmeet Mahinderjit Singh, Nurul Hashimah Ahamed Hassain Malim
4. The BDD Navigation Tracking Systems Using the Beacon
Sunggyun Jang, Inwhee Joe
5. A Distributed Gossip Optimization Algorithm for Wireless Multi-hop Networks
Jain-Shing Liu, Wan-Ling Chang
6. Call Admission Control for Real-Time and Non-real-time Traffic for Vehicular LTE Downlink Networks
Mamman Maharazu, Zurina Mohd Hanapi, Azizol Abdullah, Abdullah Muhammed
7. Using Weighted Based Feature Selection Technique for Android Malware Detection
Nurul Hidayah Mazlan, Isredza Rahmi A. Hamid
8. Providing Differentiated Services for Full-Duplex Wireless LANs
Zhijie Ma, Qinglin Zhao, Huan Zhang
9. Speeding up the Montgomery Exponentiation with CMM-SDR Over GPU with Maxwell and Pascal Architecture
Xian-Fu Wong, Bok-Min Goi, Wai-Kong Lee, Raphael C.-W. Phan
10. Robust Object Tracking via Improved Mean-Shift Model
Liqun Wang, Xuenan Shi, Sunyi Han, Jinchi
11. Phase Rotation Codebook Precoding for Space Shift Keying MIMO Systems
Mohammed Al-Ansi, Syed Alwee Aljunid, Essam Sourour
12. Novel UE RF Condition Estimation Algorithm by Integrating Machine Learning
Yupu Dong, Zhenni Pan, Mohamad Erick Ernawan, Jiang Liu, Shigeru Shimamoto, Ragil Putro Wicaksono, Seiji Kunishige, Kwangrok Chang
13. Fairness-Aware Hybrid Resource Allocation with Cross-Carrier Scheduling for LTE-U System
Yupu Dong, Zhenni Pan, Kang Kang, Jiang Liu, Shigeru Shimamoto, Ragil Putro Wicaksono, Seiji Kunishige, Kwangrok Chang
14. An IoT Implementation for Vacancy State of Public Coin Operated Washing Machine Using Vibration Level Sensors in an Apartment Setting in Thailand
Pisal Setthawong, Anan Osothsilp, Tuul Triyason
15. Developing Specific Usability Heuristics for Evaluating the Android Applications
Roobaea Alroobaea
16. Monitoring Environmental Variables Through Intelligent Lamps
Martin Pies, Radovan Hajovsky
17. Options of Monitoring the State of Protection Networks
Radovan Hajovsky, Martin Pies, Martin Stankus
18. Performance Enhancement of ℓ0-LS Approximation in Sparse Underwater Channel Estimation
S. Jimaa, L. Weruaga, T. A. Shimamura, A. AlAli, D. AlAkil, S. Albraiky, J. AlAli
19. Improving the Intra-prediction of H.264 and H.265 Video Coding Standards Using Adaptive Weighted Least Squares Based Predictor
Yenewondim Biadgie, Jung-Ju Choi, Kyung-Ah Sohan
20. A Preference-Based Application Framework for Resource-Bounded Context-Aware Agents
Ijaz Uddin, Abdur Rakib
21. B-Tree Index Layer for Multi-channel Flash Memory
Rize Jin
22. Data Security and Privacy on the Cloud: Driving to the Next Era of Technology with Confidence
Prasanna Balasooriya L N, Santoso Wibowo, Marilyn Wells
23. A Decision Making Based Authentication Scheme in Cooperative Vehicular Ad-Hoc Network
Prasanna Roy, Emmanuel Antwi-Boasiako
24. Improved Threat Models for the Security of Encrypted and Deniable File Systems
Michal Kedziora, Yang-Wai Chow, Willy Susilo
25. Performance Evaluations Power Consumption, and Heterogeneousity of WSNs in Medical Field
Reem Altaharwa, Sameem Abdulkareem, Ali Mohammed Mansoor
26. 3D Integral Imaging Based Augmented Reality with Deep Learning Implemented by Faster R-CNN
Richard Evan Sutanto, Lenny Pribadi, Sukho Lee
27. Design of OpenGL SC 2.0 Shader Language Features
Nakhoon Baek
28. Fast Prototyping for LiDAR-Scanned Point Cloud Editing Operations
Woo-seok Shin, Nakhoon Baek
29. Using Light Sensing to Acquire SpO
Yoshimitsu Nagao, Mizuho Hatsuda, Jiang Liu, Shigeru Shimamoto
30. Adaptive Resampling for Emergency Rescue Location: An Initial Concept
Wan Mohd Yaakob Wan Bejuri, Mohd Murtadha Mohamad, Raja Zahilah Raja Mohd Radzi, Mazleena Salleh, Ahmad Fadhil Yusof
31. Using the IQRF Technology for the Internet of Things: Case Studies
Martin Pies, Radovan Hajovsky
32. C-HYFLUR: Recovery for Power-off Failure in Flash Memory Storage Systems Using Compression Scheme for HYbrid FLUsh Recovery
Ji-Hwan Chung, Sungsoo Kim, Tae-Sun Chung
33. ERF: Efficient Cache Eviction Strategy for E-commerce Applications
Jung Hwa Lee, Se Jin Kwon, Tae-Sun Chung
34. A Recursive Analysis Approach for Retrial Mobile Networks with Two Customers Classes and Non-preemptive Priority
Nawel Gharbi, Leila Charabi
35. A Survey of Vehicular Ad-Hoc Network Security
MinSu Kim
36. Detecting Negative Deceptive Opinion from Tweets
Alemu Molla, Yenewondim Biadgie, Kyung-Ah Sohn
37. A Study on Effectiveness of Network Attack Using Analysis of Eigenvalue
Ayumi Ishimaru, Hidema Tanaka
38. Analysis of Slow Read DoS Attack and Communication Environment
Shunsuke Tayama, Hidema Tanaka
39. A SFC Network Management System in SDN
Li-Der Chou, Chia-Wei Tseng, Hsin-Yao Chou, Yao-Tsung Yang
40. A Performance Comparison of Deterministic and Adaptive Routing for an x-Folded TM Topology
Mehrnaz Moudi, Mohamed Othman, Amir Rizaan Abdul Rahiman, Kweh Yeah Lun
41. Temporal Citation Network-Based Feature Extraction for Cited Count Prediction
Ho-Min Park, Yenewondim Biadgie Sinshaw, Kyung-Ah Sohn
42. A Secure Workflow-Net Model for Service-Specific Overlay Networks
Ismaeel Al Ridhawi, Yehia Kotb
43. Comparison of UML Sequence Diagrams to Trace Technical Specification Change
Supatra Insri, Yachai Limpiyakorn
44. The Isolation Algorithm of Problem Location with Multi-agent Approach for End-to-End Network Performance Management
Buseung Cho, Kuinam J. Kim, Hyuncheol Kim
45. Revised Virtual Resources Allocation Scheme in Network Function Virtualization (NFV) Enabled Networks
Hyuncheol Kim
46. Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security
Hyunjoo Kim, Youngsoo Kim, Ikkyun Kim, Hyuncheol Kim
47. A Snapshot of 26 Years of Research on Creativity in Software Engineering - A Systematic Literature Review
Aamir Amin, Shuib Basri, Mohd Fadzil Hassan, Mobashar Rehman
48. Bilingual Word-Embedding for Korean and English Without Word Alignments
Min-su Kim, Moon-su Cha, Kyung-Ah Sohn
49. A Maturity Model for Implementation of Enterprise Business Intelligence Systems
Cheng Wai Khuen, Mobashar Rehman
50. Autonomous Text Summarization Using Collective Intelligence Based on Nature-Inspired Algorithm
Kaleab Getaneh Tefrie, Kyung-Ah Sohn
51. Large Scale Text Classification with Efficient Word Embedding
Xiaohan Ma, Rize Jin, Joon-Young Paik, Tae-Sun Chung
52. Study on the Strategies for Activating Silver Care in O2O Platform
SeungAe Kang
53. A Study on the Convergence Education of Science and Physical Activity Using IT Technology
SunYoung Kang, SeungAe Kang
54. A Proposal of Location Aware Shopping Assistance Using Memory-Based Resampling
Wan Mohd Yaakob Wan Bejuri, Mohd Murtadha Mohamad, Raja Zahilah Raja Mohd Radzi, Mazleena Salleh, Ahmad Fadhil Yusof
55. A Study on Video Stream Synchronization from Multi-Source to Multi-Screen
Hyojin Park, Kyuyeong Jeon, Jinhong Yang, Kuinam J. Kim
56. A Nine-Switch Unified Power Quality Conditioner with Enhanced Repetitive Controller
Dang-Minh Phan, Hong-Hee Lee
57. Rotor Flux Estimation for Low Speed Induction Motor Sensorless Drives with MRAS
Bigyan Basnet, Hong-Hee Lee
58. An Enhanced Reactive Power Sharing and Secondary Voltage Restoration Control in Islanded Microgrid
Minh-Duc Pham, Hong-Hee Lee
59. A Predictive Current Control for Coordinate Control of Current and Power of Matrix Converter Under Unbalanced Input Voltages
Thanh-Luan Nguyen, Hong-Hee Lee
60. Comparison Between Three Different Level of Cascaded Multilevel Inverter with Separated DC Sources (CISS)
Suresh Thanakodi, Yasotharan Visuvanathan, Nazatul Shiema Moh Nazar, Muhammad ‘Izzat Ahmad Sukeri
61. Survivor Tracking System Based on Heart Beats
Suresh Thanakodi, Nazatul Shiema Moh Nazar, Bryon Sim Phin Tzen, Muhammad Muaz Mubasyir Roslan
62. Boundary Effects to Accelerate Stochastic Moving Multi-Agents
Yuta Tsuruoka, Shihoko Tanabe, Marin Numazaki, Isamu Shioya
63. Discovering Similar Music for Alpha Wave Music
Yu-Lung Lo, Chien-Yu Chiu, Ta-Wei Chang
64. A Novel Vibration-Based Real-Time Monitoring System for Illegal Logging
Jiun-Jian Liaw, Chun-Cheng Peng, Yu-Yan Chen, Wen-Chung Tsai
65. The Development of Skin Image Analysis Device Based on Embedded System
Chuan-Pin Lu, Yu-Wen Liu, Zi-Qing Fang, Zi-Yu Chen, Tzu-Ching Wu, Yun-Jie Zhang
66. A QoS Channel Allocation Scheme for Enhancing the Reliability in 6TiSCH Networks
Tsung-Han Lee, Lin-Huang Chang, Yan-Wei Liu
67. An Adaptive User-Defined Traffic Control Mechanism for SDN
Hung-Chi Chu, Tzu-Hsuan Lin
68. Retrieval of 3D Trademark Based on Discrete Fourier Transform
Chu-Hui Lee, Liang-Hsiu Lai
69. Performance Analysis of Video Transmission Over Wireless Multimedia Sensor Networks
Lin-huang Chang, Tzu-Chieh Lin, Tsung-Han Lee
70. Image Steganographic Method Based on Pencil-Shaped Pattern
Chin-Feng Lee, Ying-Xiang Wang, An-Tong Shih
71. Wind Direction and Speed Estimation for Quadrotor Based Gas Tracking Robot
Kok Seng Eu, Wei Zheng Chia, Kian Meng Yap
Keywords: Engineering, Communications Engineering, Networks, Computer Systems Organization and Communication Networks, Signal, Image and Speech Processing
- Editor
- Joukov, Nikolai
- Kim, Kuinam J.
- Publisher
- Springer
- Publication year
- 2018
- Language
- en
- Edition
- 1
- Series
- Lecture Notes in Electrical Engineering
- Page amount
- 19 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9789811052811
- Printed ISBN
- 978-981-10-5280-4