default search action
ICNCC 2016: Kyoto, Japan
- Proceedings of the Fifth International Conference on Network, Communication and Computing, ICNCC '16, Kyoto, Japan, December 17-21, 2016. ACM 2016, ISBN 978-1-4503-4793-8
Image and signal processing
- Mary Jane Magno-Tan, Armin S. Coronado, Rustom R. Garcia, May D. Maulani:
Weight Measurement of Holothuria Scabra Jaeger, 1833 Utilizing the Surface Area of Digitized Image Captured under Water. 1-5 - Ao Wu, Yongming Huang, Guobao Zhang:
Feature Fusion Methods for Robust Speech Emotion Recognition Based on Deep Belief Networks. 6-10 - Suratose Tritilanunt, Surapol Ruaysungnoen:
Security Assessment of Information System in Hospital Environment. 11-16 - P. S. Joseph Ng, C. M. Kang, Ahmad Kamil Mahmood, S. W. Wong, K. Y. Phan, Seow Hui Saw, Jit Theam Lim:
EaaS: Available yet Hidden Infrastructure inside MSE. 17-21 - Saihua Song, Heng Yao, Chuan Qin, Ying Tian:
A Forgery Video Detection Algorithm for Resolution Promotion Manipulations Using Frequency Spectrum Analysis. 22-26 - Chu-Hui Lee, Zhi-Yong Qiu:
Motion Image De-blurring System Based on the Effectiveness Parameters of Point Spread Function. 27-31 - Shanlan Nie, Haopeng Zhang, Zhiguo Jiang:
Sea-Land Segmentation Based on Template Matching. 32-36 - Bundit Manaskasemsak, Bodin Chinthanet, Arnon Rungsawang:
Graph Clustering-Based Emerging Event Detection from Twitter Data Stream. 37-41 - Xiaoling Wang, Yao Wang, Xue Wang:
Quality Monitoring, Analysis and Evaluation of BDS B1I Signal. 42-46 - Hisyam Fahmi, Remmy A. M. Zen, Hadaiq Rolis Sanabila, Ida Nurhaida, Aniati Murni Arymurthy:
Feature Selection and Reduction for Batik Image Retrieval. 47-52 - Tarun Kumar, Suraj Gupta, Dharmender Singh Kushwaha:
An Efficient Approach for Automatic Number Plate Recognition for Low Resolution Images. 53-57 - Zhonghua Wang, Faliang Huang, Shijie Hu:
Bidirectional Diffusion Algorithm for Image Enhancement with Local Feature. 58-62 - Yi-Shan Lin, Chun-Liang Lee, Yaw-Chung Chen:
Length-bounded Hybrid CPU/GPU Pattern Matching Algorithm for Deep Packet Inspection. 63-67 - Zhao Wang, Yuan Xi:
A Kind of De-noising and Segmentation Method for Hollow CAPTCHAs with Noise Arcs. 68-72 - Radi M. Kadushnikov, Sergey Studenok, Vyacheslav V. Mizgulin:
The Real Time Endoscopic Image Analysis Algorithm. 73-77
Network engineering and technology application
- Anak Agung Putri Ratna, F. Astha Ekadiyanto, Mardiyah, Prima Dewi Purnamasari, Muhammad Salman:
Analysis on the Effect of Term-Document's Matrix to the Accuracy of Latent-Semantic-Analysis-Based Cross-Language Plagiarism Detection. 78-82 - Hsin-Tsung Lin, Pi-Chung Wang:
TCAM-Based Packet Classification Using Multi-stage Scheme. 83-87 - Clief Hendro Sengkey, Hsien-Tsung Chang:
A Topic of Interest-based Approach on Online Social Network Services for Information Sharing. 88-92 - Shaifu Gupta, Aroor Dinesh Dileep, Timothy A. Gonsalves:
Fractional Difference based Hybrid Model for Resource Prediction in Cloud Network. 93-97 - Bo Li, Jinzhen Wang, Ping Zhao, Zhongjiang Yan, Mao Yang:
Research of Recognition System of Web Intrusion Detection Based on Storm. 98-102 - Lu Chen, Lianchen Liu, Jiaxing Shang:
Fault Tolerance for Web Service Based on Component Importance in Service Networks. 103-109 - Ge Luo, Ying Gao, Changchun Zheng:
Strongly Secure Network Coding via Reed-Solomon Codes. 110-114 - Jian Xie, Lin Gong, Zijian Zhang, Yan Yan, Sheng Tang:
Innovation Oriented Hyper Model and Evolution of Knowledge Network. 115-119 - Ivan Nikolaev, Martin Grill, Veronica Valeros:
Exploit Kit Website Detection Using HTTP Proxy Logs. 120-125 - Jing Deng, Xiaoli Gao, Chunyue Wang:
Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks. 126-130
Computer science and information technology
- Saurabh Kumar, Shana Moothedath, Prasanna Chaporkar, Madhu N. Belur:
An MCMC Based Course to Teaching Assistant Allocation. 131-134 - Prima Dewi Purnamasari, Anak Agung Putri Ratna, Benyamin Kusumoputro:
Artificial Neural Networks Based Emotion Classification System through Relative Wavelet Energy of EEG Signal. 135-139 - Chatchai Kasemtaweechok, Worasait Suwannik:
Prototype Selection for k-Nearest Neighbors Classification Using Geometric Median. 140-144 - Gridaphat Sriharee:
A Federated GIS Data Service System for Tabular Data Integration Using Ontology Approach. 145-149 - Ching-Hsue Cheng:
A Text Mining Based on Refined Feature Selection to Predict Sentimental Review. 150-154 - Walaithip Thanakorncharuwit, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn:
Generating Test Cases from UML Activity Diagram Based on Business Flow Constraints. 155-160 - Worasit Choochaiwattana:
An Architecture of an Academic Search Engine with Personalized Search Result Ranking Mechanism. 161-165 - Sepehr Forouzani, Yin Kia Chiam, Soroush Forouzani:
Method for Assessing Software Quality Using Source Code Analysis. 166-170 - Shengyingjie Liu, Jianwen Sun, Zhi Liu, Xian Peng, Sanya Liu:
Query-Directed Probing LSH for Cosine Similarity. 171-177 - Yang Xie, Xiaolu Zhou, Zepeng Wen, Hui Xie:
Research of a Double Temporal Object-oriented Data Model. 178-181 - Merve Güllü, Eyüp Burak Ceyhan, Ceren Ulucan:
A New Approach: Predicting Height of a Person from Joint Ratio of Fingers. 182-187 - Shipeng Xu, Hongzhi Yu, Guanyu Li, Hanbin Zhang, Jun Ma:
Acoustic Modeling for Lhasa Tibetan Speech Synthesis Based on DAEM Algorithm. 188-192 - Mahanama Wickramasinghe, Hui Guo:
Data-Space Relocation to Improve Data Cache Performance for Embedded Multi-threaded Processor Systems. 193-197 - Eko Kuswardono Budiardjo, Elviawaty Muisa Zamzami, Ganjar Ramadhan, Muh. Nur Musa:
Ontology-Based Knowledge Management System Model for R3ST Software Maintenance Environment. 198-202 - Sayaka Kamei, Hirotsugu Kakugawa:
An Asynchronous Message-passing Distributed Algorithm for the Generalized Local Critical Section Problem. 203-207 - Xue Zhang, Lu Peng, Chenyan Li, Qing Li:
Construct Parity-check Matrix H of QC LDPC Codes via Arithmetic Progression. 208-212 - Narongsak Chayangkoon, Anongnart Srivihok:
Two Step Clustering Model for K-Means Algorithm. 213-217 - Jianguo Hao, Zhijia Wang, Yibin Tu, Heng Zhang:
Architecture of LVC Systems based on Real-Time Simulation Proxy. 218-223
Mobile communication and wireless technology
- Qian Cui, Kai Shuang:
Feasibility Analysis of SCMA in Logging Cable Telemetry Systems with an Optimal 16-point Codebook. 224-228 - Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li:
Cryptanalysis of Dimitriou's Key Evolving RFID Systems. 229-233 - Qian Cui, Kai Shuang:
A New Modeling Approach using Genetic Algorithm for Transmission Performance Estimation in Complex Environment. 234-238 - Xiaopeng Liu, Xihong Chen, Zedong Xie:
Application of OQAM/OFDM Modulation in Troposcatter Communication. 239-245 - Zedong Xie, Xihong Chen, Xiaopeng Liu:
Effect of Doppler Shift on the MIMO-OFDM Systems in Troposcatter Fading Channels. 246-251 - Qingyun Fang, Yubing Han, Xuan Chen, Kai Qi, Mengyao Qi, Yi Zhang:
OFDM Channel Estimation Based on Fast Approximated Power Iteration Subspace Tracking. 252-256 - Wanming Hao, Osamu Muta, Haris Gacanin, Hiroshi Furukawa:
Energy-Efficient Resource Allocation for Cooperative Cognitive Radio Networks with Imperfect Spectrum Sensing. 257-261 - Ahsan Jamal Akbar, Zhuchuang Shao, Dong Wang:
Target Discovery: Using MUSIC with Optimized Angle-of-Arrival and Signal-Time-of-Flight. 262-266 - Kazuki Maruta, Yu Nakayama, Takuya Tsutsumi:
Throughput Performance Evaluation on Wired and Wireless Network Cooperation Quick Recovery System Employing IEEE 802.11 DCF. 267-271 - Motoi Kodama, Shinichiro Haruyama:
Visible Light Communication using Two Different Polarized DMD Projectors for Seamless Location Services. 272-276 - Zhiguo Liu, Lingyu Qin, Li Yao:
Service-Oriented Virtual Resource Management Framework for Satellite Network. 277-281
Performance analysis of Wireless Sensor Networks
- Sang Guun Yoo:
Cryptanalysis of Several Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks. 282-286 - Peng Geng, Yan Liu, Jie Yang:
A Dynamic Energy Balance Method for Wireless Sensor Networks with Small World Characteristics. 287-291 - Mirza Ferdous Rahman, Farhad Mehdipour, Hiroshi Furukawa:
Modeling the Impact of Clustering with Random Event Arrival on the Lifetime of WSN. 292-296 - Zhenqiang Wei, Hoon Oh:
A Receiver-Initiated Big Slot Scheduling MAC Protocol for Reducing Collision in Wireless Sensor Networks. 297-301 - Ibtisam Joda Habeeb, Ra'ad A. Muhajjar:
Secured Wireless Sensor Network Using Improved Key Management. 302-305
Intelligent control system and application
- Nadea Nabilla Putri, Arsla Khan, Soo Young Shin:
Quadcopter Based Localization with Archimedian Trajectory. 306-309 - Karlisa Priandana, Wahidin Wahab, Benyamin Kusumoputro:
Comparison of Neural Networks Based Direct Inverse Control Systems for a Double Propeller Boat Model. 310-315 - Myung-Jin Chung, Chong-Seong Hong:
Monitoring and Controlling Method of the Environment Condition in the Animal Breeding Farm by Using Smart Phone. 316-320 - Kuei-Chung Chang, Po-Kai Liu, Hung Hsiang Lin:
Design of Cameras Gateway for Remote Monitoring and Human Tracking. 321-325 - Jun-Dong Chang:
Spatial-Temporal Based Traffic Speed Imputation for GPS Probe Vehicles. 326-330 - Mark Tee Kit Tsun, Lau Bee Theng, Hudyjaya Siswoyo Jo, Sian Lun Lau:
Proposing a Sensor Fusion Technique Utilizing Depth and Ranging Sensors for Combined Human Following and Indoor Robot Navigation. 331-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.