Joukov, Nikolai

Mobile and Wireless Technologies 2017

Joukov, Nikolai - Mobile and Wireless Technologies 2017, ebook


Ebook, PDF with Adobe DRM
ISBN: 9789811052811
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. A Lightweight Mutual Authentication Protocol for the IoT
Mohamed Tahar Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet

2. Improving Consumers’ Value and Satisfaction Towards Recreational Facilities Through Apps
Norfaradilla Wahid, Fathin Najwa Masnan, Hanayanti Hafit, Shahreen Kasim

3. N-LibSys: Library System Using NFC Technology
See Pui Mun, Mohd Heikal Husin, Manmeet Mahinderjit Singh, Nurul Hashimah Ahamed Hassain Malim

4. The BDD Navigation Tracking Systems Using the Beacon
Sunggyun Jang, Inwhee Joe

5. A Distributed Gossip Optimization Algorithm for Wireless Multi-hop Networks
Jain-Shing Liu, Wan-Ling Chang

6. Call Admission Control for Real-Time and Non-real-time Traffic for Vehicular LTE Downlink Networks
Mamman Maharazu, Zurina Mohd Hanapi, Azizol Abdullah, Abdullah Muhammed

7. Using Weighted Based Feature Selection Technique for Android Malware Detection
Nurul Hidayah Mazlan, Isredza Rahmi A. Hamid

8. Providing Differentiated Services for Full-Duplex Wireless LANs
Zhijie Ma, Qinglin Zhao, Huan Zhang

9. Speeding up the Montgomery Exponentiation with CMM-SDR Over GPU with Maxwell and Pascal Architecture
Xian-Fu Wong, Bok-Min Goi, Wai-Kong Lee, Raphael C.-W. Phan

10. Robust Object Tracking via Improved Mean-Shift Model
Liqun Wang, Xuenan Shi, Sunyi Han, Jinchi

11. Phase Rotation Codebook Precoding for Space Shift Keying MIMO Systems
Mohammed Al-Ansi, Syed Alwee Aljunid, Essam Sourour

12. Novel UE RF Condition Estimation Algorithm by Integrating Machine Learning
Yupu Dong, Zhenni Pan, Mohamad Erick Ernawan, Jiang Liu, Shigeru Shimamoto, Ragil Putro Wicaksono, Seiji Kunishige, Kwangrok Chang

13. Fairness-Aware Hybrid Resource Allocation with Cross-Carrier Scheduling for LTE-U System
Yupu Dong, Zhenni Pan, Kang Kang, Jiang Liu, Shigeru Shimamoto, Ragil Putro Wicaksono, Seiji Kunishige, Kwangrok Chang

14. An IoT Implementation for Vacancy State of Public Coin Operated Washing Machine Using Vibration Level Sensors in an Apartment Setting in Thailand
Pisal Setthawong, Anan Osothsilp, Tuul Triyason

15. Developing Specific Usability Heuristics for Evaluating the Android Applications
Roobaea Alroobaea

16. Monitoring Environmental Variables Through Intelligent Lamps
Martin Pies, Radovan Hajovsky

17. Options of Monitoring the State of Protection Networks
Radovan Hajovsky, Martin Pies, Martin Stankus

18. Performance Enhancement of ℓ0-LS Approximation in Sparse Underwater Channel Estimation
S. Jimaa, L. Weruaga, T. A. Shimamura, A. AlAli, D. AlAkil, S. Albraiky, J. AlAli

19. Improving the Intra-prediction of H.264 and H.265 Video Coding Standards Using Adaptive Weighted Least Squares Based Predictor
Yenewondim Biadgie, Jung-Ju Choi, Kyung-Ah Sohan

20. A Preference-Based Application Framework for Resource-Bounded Context-Aware Agents
Ijaz Uddin, Abdur Rakib

21. B-Tree Index Layer for Multi-channel Flash Memory
Rize Jin

22. Data Security and Privacy on the Cloud: Driving to the Next Era of Technology with Confidence
Prasanna Balasooriya L N, Santoso Wibowo, Marilyn Wells

23. A Decision Making Based Authentication Scheme in Cooperative Vehicular Ad-Hoc Network
Prasanna Roy, Emmanuel Antwi-Boasiako

24. Improved Threat Models for the Security of Encrypted and Deniable File Systems
Michal Kedziora, Yang-Wai Chow, Willy Susilo

25. Performance Evaluations Power Consumption, and Heterogeneousity of WSNs in Medical Field
Reem Altaharwa, Sameem Abdulkareem, Ali Mohammed Mansoor

26. 3D Integral Imaging Based Augmented Reality with Deep Learning Implemented by Faster R-CNN
Richard Evan Sutanto, Lenny Pribadi, Sukho Lee

27. Design of OpenGL SC 2.0 Shader Language Features
Nakhoon Baek

28. Fast Prototyping for LiDAR-Scanned Point Cloud Editing Operations
Woo-seok Shin, Nakhoon Baek

29. Using Light Sensing to Acquire SpO2 Biological Information via a Non-contact Approach
Yoshimitsu Nagao, Mizuho Hatsuda, Jiang Liu, Shigeru Shimamoto

30. Adaptive Resampling for Emergency Rescue Location: An Initial Concept
Wan Mohd Yaakob Wan Bejuri, Mohd Murtadha Mohamad, Raja Zahilah Raja Mohd Radzi, Mazleena Salleh, Ahmad Fadhil Yusof

31. Using the IQRF Technology for the Internet of Things: Case Studies
Martin Pies, Radovan Hajovsky

32. C-HYFLUR: Recovery for Power-off Failure in Flash Memory Storage Systems Using Compression Scheme for HYbrid FLUsh Recovery
Ji-Hwan Chung, Sungsoo Kim, Tae-Sun Chung

33. ERF: Efficient Cache Eviction Strategy for E-commerce Applications
Jung Hwa Lee, Se Jin Kwon, Tae-Sun Chung

34. A Recursive Analysis Approach for Retrial Mobile Networks with Two Customers Classes and Non-preemptive Priority
Nawel Gharbi, Leila Charabi

35. A Survey of Vehicular Ad-Hoc Network Security
MinSu Kim

36. Detecting Negative Deceptive Opinion from Tweets
Alemu Molla, Yenewondim Biadgie, Kyung-Ah Sohn

37. A Study on Effectiveness of Network Attack Using Analysis of Eigenvalue
Ayumi Ishimaru, Hidema Tanaka

38. Analysis of Slow Read DoS Attack and Communication Environment
Shunsuke Tayama, Hidema Tanaka

39. A SFC Network Management System in SDN
Li-Der Chou, Chia-Wei Tseng, Hsin-Yao Chou, Yao-Tsung Yang

40. A Performance Comparison of Deterministic and Adaptive Routing for an x-Folded TM Topology
Mehrnaz Moudi, Mohamed Othman, Amir Rizaan Abdul Rahiman, Kweh Yeah Lun

41. Temporal Citation Network-Based Feature Extraction for Cited Count Prediction
Ho-Min Park, Yenewondim Biadgie Sinshaw, Kyung-Ah Sohn

42. A Secure Workflow-Net Model for Service-Specific Overlay Networks
Ismaeel Al Ridhawi, Yehia Kotb

43. Comparison of UML Sequence Diagrams to Trace Technical Specification Change
Supatra Insri, Yachai Limpiyakorn

44. The Isolation Algorithm of Problem Location with Multi-agent Approach for End-to-End Network Performance Management
Buseung Cho, Kuinam J. Kim, Hyuncheol Kim

45. Revised Virtual Resources Allocation Scheme in Network Function Virtualization (NFV) Enabled Networks
Hyuncheol Kim

46. Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security
Hyunjoo Kim, Youngsoo Kim, Ikkyun Kim, Hyuncheol Kim

47. A Snapshot of 26 Years of Research on Creativity in Software Engineering - A Systematic Literature Review
Aamir Amin, Shuib Basri, Mohd Fadzil Hassan, Mobashar Rehman

48. Bilingual Word-Embedding for Korean and English Without Word Alignments
Min-su Kim, Moon-su Cha, Kyung-Ah Sohn

49. A Maturity Model for Implementation of Enterprise Business Intelligence Systems
Cheng Wai Khuen, Mobashar Rehman

50. Autonomous Text Summarization Using Collective Intelligence Based on Nature-Inspired Algorithm
Kaleab Getaneh Tefrie, Kyung-Ah Sohn

51. Large Scale Text Classification with Efficient Word Embedding
Xiaohan Ma, Rize Jin, Joon-Young Paik, Tae-Sun Chung

52. Study on the Strategies for Activating Silver Care in O2O Platform
SeungAe Kang

53. A Study on the Convergence Education of Science and Physical Activity Using IT Technology
SunYoung Kang, SeungAe Kang

54. A Proposal of Location Aware Shopping Assistance Using Memory-Based Resampling
Wan Mohd Yaakob Wan Bejuri, Mohd Murtadha Mohamad, Raja Zahilah Raja Mohd Radzi, Mazleena Salleh, Ahmad Fadhil Yusof

55. A Study on Video Stream Synchronization from Multi-Source to Multi-Screen
Hyojin Park, Kyuyeong Jeon, Jinhong Yang, Kuinam J. Kim

56. A Nine-Switch Unified Power Quality Conditioner with Enhanced Repetitive Controller
Dang-Minh Phan, Hong-Hee Lee

57. Rotor Flux Estimation for Low Speed Induction Motor Sensorless Drives with MRAS
Bigyan Basnet, Hong-Hee Lee

58. An Enhanced Reactive Power Sharing and Secondary Voltage Restoration Control in Islanded Microgrid
Minh-Duc Pham, Hong-Hee Lee

59. A Predictive Current Control for Coordinate Control of Current and Power of Matrix Converter Under Unbalanced Input Voltages
Thanh-Luan Nguyen, Hong-Hee Lee

60. Comparison Between Three Different Level of Cascaded Multilevel Inverter with Separated DC Sources (CISS)
Suresh Thanakodi, Yasotharan Visuvanathan, Nazatul Shiema Moh Nazar, Muhammad ‘Izzat Ahmad Sukeri

61. Survivor Tracking System Based on Heart Beats
Suresh Thanakodi, Nazatul Shiema Moh Nazar, Bryon Sim Phin Tzen, Muhammad Muaz Mubasyir Roslan

62. Boundary Effects to Accelerate Stochastic Moving Multi-Agents
Yuta Tsuruoka, Shihoko Tanabe, Marin Numazaki, Isamu Shioya

63. Discovering Similar Music for Alpha Wave Music
Yu-Lung Lo, Chien-Yu Chiu, Ta-Wei Chang

64. A Novel Vibration-Based Real-Time Monitoring System for Illegal Logging
Jiun-Jian Liaw, Chun-Cheng Peng, Yu-Yan Chen, Wen-Chung Tsai

65. The Development of Skin Image Analysis Device Based on Embedded System
Chuan-Pin Lu, Yu-Wen Liu, Zi-Qing Fang, Zi-Yu Chen, Tzu-Ching Wu, Yun-Jie Zhang

66. A QoS Channel Allocation Scheme for Enhancing the Reliability in 6TiSCH Networks
Tsung-Han Lee, Lin-Huang Chang, Yan-Wei Liu

67. An Adaptive User-Defined Traffic Control Mechanism for SDN
Hung-Chi Chu, Tzu-Hsuan Lin

68. Retrieval of 3D Trademark Based on Discrete Fourier Transform
Chu-Hui Lee, Liang-Hsiu Lai

69. Performance Analysis of Video Transmission Over Wireless Multimedia Sensor Networks
Lin-huang Chang, Tzu-Chieh Lin, Tsung-Han Lee

70. Image Steganographic Method Based on Pencil-Shaped Pattern
Chin-Feng Lee, Ying-Xiang Wang, An-Tong Shih

71. Wind Direction and Speed Estimation for Quadrotor Based Gas Tracking Robot
Kok Seng Eu, Wei Zheng Chia, Kian Meng Yap

Keywords: Engineering, Communications Engineering, Networks, Computer Systems Organization and Communication Networks, Signal, Image and Speech Processing

Publication year
Lecture Notes in Electrical Engineering
Page amount
19 pages
Technology, Energy, Traffic
Printed ISBN

Similar titles