default search action
ICIT 2018: Hong Kong, China
- Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, December 29-31, Hong Kong, China. ACM 2018, ISBN 978-1-4503-6629-8
Computer Theory and Application
- Wenjie Li, Hua Xue:
A Clustering Algorithm Based on Weighted Distance and User Preference of Incorporating Time Factors. 1-6 - Jawairia Rasheed, Usman Akram, Ahmed Kamran Malik:
Terrorist Network Analysis and Identification of Main Actors Using Machine Learning Techniques. 7-12 - Thanuja Chandani Sandanayake, G. A. I. Limesha, T. S. S. Madhumali, W. P. I. Mihirani, M. S. A. Peiris:
Automated CV Analyzing and Ranking Tool to Select Candidates for Job Positions. 13-18 - Patsaraporn Somboonsak:
Misspelling Error Detection in Thai Language Application. 19-24 - Chiliang Zhang, Zhimou Yang, Zuochang Ye:
Detecting Adversarial Perturbations with Salieny. 25-30 - Jennifer O. Contreras, Melvin A. Ballera, Ace C. Lagman, Jennalyn G. Raviz:
Lexicon-based Sentiment Analysis with Pattern Matching Application using Regular Expression in Automata. 31-36
Software Design and Data Engineering
- Wei-Zhong Yan, Jia Kang, Ding-Wen Zhang:
Measure and Analysis of Influence Factors of Inbound Tourism Level in Shaanxi Based on Panel Data Model. 37-41 - Youyung Hyun, Ryuichi Hosoya, Taro Kamioka:
The Implications of Big Data Analytics Orientation upon Deployment. 42-48 - Kai Sheng Teong, Yong En Tan, Mehlam Shabbir, Sook-Ling Chua, Lee Kien Foo:
Finding Insights through Interactive Visualization. 49-53 - Yonghong Li, Shuwen Zhang, Nan Jia:
Research on the Transformation and Upgrading Path and Selection of Traditional Industries from the Perspective of Big Data. 54-59 - Murni Fatehah, Vitaliy Mezhuyev:
Design and Process Metamodels for Modelling and Verification of Safety-Related Software Applications in Smart Building Systems. 60-64 - Xiaohan Qiu, Hua Jing, Wei Zhang:
Application of an Improved Combinatorial Test Strategy in Test Case Generation for Aviation Software. 65-69 - Wilver Auccahuasi, Grisi Bernardo Santiago, Elizabeth Oré Núñez, Fernando Sernaque:
Interactive online tool as an instrument for learning mathematics through programming techniques, aimed at high school students. 70-76 - Qi Li, ZhiCheng Ma, Shibo Yang, Xianbo Li, Zhixin Ma, Xinlei Wei:
Reconstruct the Scope, Content and Approaches of Computational Linguistics. 77-81 - Lanying Guo, Chao Peng, Cheng He:
New Reversible Computing Algorithms for Shortest Paths Problem. 82-87
Information Security and Encryption
- Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen:
On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. 88-91 - Ali Md. Arshad, Yuta Kodera, Shoji Heguri, Takuya Kusaka, Satoshi Uehara, Robert H. Morelos-Zaragoza:
Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field. 92-96 - Monther Aldwairi, Mohammad A. Alshboul, Asmaa Seyam:
Characterizing Realistic Signature-based Intrusion Detection Benchmarks. 97-103 - Gongliang Wang, Zhenguo Yang, Junhong Chen, Kanoksak Wattanachote, Wenyin Liu:
Security Mechanism Improvement for 2D Barcodes using Error Correction with Random Segmentation. 104-109 - Xinman Zhang, Jiayu Zhang, Tingting He, Lydia Yiyu Chen, Yuanjun Shen, Xuebin Xu:
A Speech and Lip Authentication System Based On Android Smart Phone. 110-114
Cloud Computing and IoT Applications
- Godwin S. Monserate, Juliet S. Mendez:
Adaptive Network Tools and Services Network Topology Mapper. 115-119 - Sumathi Balakrishnan, Hemalata Vasudavan, Raja Kumar Murugesan:
Smart Home Technologies: A Preliminary Review. 120-127 - Sarawut Ramjan:
Conceptual Framework of a Fuzzy Logic Forecasting Decision-Support System for Diaper Purchase to be Used in an Internet of Things environment. 128-133 - Zakariya Ammar, Ahmad Alsharif:
Deployment of IoT-based honeynet model. 134-139 - Mohammed M. Alani:
IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks. 140-144 - Moussa Witti, Dimitri Konstantas:
A Secure and Privacy-preserving Internet of Things Framework for Smart City. 145-150 - Hemalata Vasudavan, Kamalanathan Shanmugam, Harith Abdilaziz Ahmada:
User Perceptions in Adopting Cloud Computing in Autonomous Vehicle. 151-156 - Reynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina:
Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing. 157-162 - Huafei Zhu, Wee Keong Ng:
Sustainable Data Management Strategies and Systems in Untrust Cloud Environments. 163-167
Image Processing
- Kunlei Jing, Xinman Zhang, Xuebin Xu:
An Overview of Multimode Biometric Recognition Technology. 168-172 - Xun Liang, Yanni Shi, Xiaoyu Zhan:
Fatigue Driving Detection Based on Facial Features. 173-178 - Florence Jean B. Talirongan, Ariel M. Sison, Ruji P. Medina:
An MD5-Hirose Hashing Algorithm for Digital Image Watermarking. 179-183 - Man-Sheng Chen, Dong Huang, Mingkai He, Chang-Dong Wang:
Ensemble Clustering by Noise-Aware Graph Decomposition. 184-188 - Jianying Wang, Shi Fei, Zhao Qiang:
Application of Binocular Vision Algorithm Based on Angle Measuring in Moving Target Tracking System. 189-193 - Wenbi Rao, Yongqiang Tan, Yao Tan:
Video Content Annotation Method Based on Multi-weight Multi-source Transfer Learning. 194-198 - Aleta C. Fabregas, Debrelie Cruz, Mark Daniel Marmeto:
SUGPO: A White Spot Disease Detection in Shrimps Using Hybrid Neural Networks with Fuzzy Logic Algorithm. 199-203 - Hendry, Rung-Ching Chen:
A New Method for License Plate Character Detection and Recognition. 204-208 - Xinman Zhang, Qi Xiong, Xuebin Xu, Zhiyuan Ma:
Single Biometric Recognition Research: A Summary. 209-213 - Hidear Talirongan, Ariel M. Sison, Ruji P. Medina:
A New Advanced Encryption Standard-Butterfly Effect in Protecting Image of Copyright Piracy. 214-218
Modern Information Theory and Technology
- I-Ching Lin, Han-Chi Fu, Sheng-Hung Chang, Kaijun Leng:
An Evaluation Model Based on Product Characteristics for End-Delivery Choice in China e-Commerce Services. 219-223 - Wei Quan, Zheng Chen, Xiaohua Tony Hu:
BANN: A Framework for Aspect-Level Opinion Mining. 224-228 - Shivam Kumar, Nersisson Ruban:
Smart Healthcare Expert System with Medicine Dispenser. 229-234 - Dorota Jelonek:
Self-Assessment of the Maturity of Management Information Systems-Business Alignment. 235-239 - Xikai Tang, Zepeng Gong:
A Comparative Study of Broadband Policy between China and the United States: Based on a "Tool-Welfare" Analysis Framework. 240-244 - Supparang Ruangvanich, Prachyanun Nilsook:
Personality Learning Analytics System in Intelligent Virtual Learning Environment. 245-250 - K. Dinesh, R. Subramanian, Ibrahim Dweib, M. Nandhini, Mohamed Yasin Noor Mohamed, Rajakumar Ramalingam:
Bi-Directional Self-Organization Technique for Enhancing the Genetic Algorithm. 251-255 - Rimpei Kunimoto, Hiroyuki Hisamatsu:
Proposal for a Course Support System for Database Exercises. 256-260 - Zhaopeng Xu, Jinpei Li, Runfei Li, Ye Tian, Peng Du, Zhongbao Feng:
Fault Feature Extraction of Wind Turbine Gearbox Based on Improved Singular Value Decomposition and Noise Reduction. 261-266 - Ace C. Lagman, Melvin A. Ballera, Jennifer O. Contreras, Jennalyn G. Raviz:
Development of Converted Deterministic Finite Automaton of Decision Tree Rules of Student Graduation and Adaptive Learning Environment. 267-271 - Jun Yan, Yusheng Xu, Jingyi Zhang:
Overlapping community detection based on contribution value improved SLPA. 272-277 - Dehong Qiu, Pin Zhang, Shaohong Fang, Xuwen Lang, Hao Feng:
Discovering Dependence across Traffic Data of Disparate Regions Using Multiscale Generalized Correlation. 278-283
Electronic Information and Control System
- Guangyin Jin, Jincai Huang, Yang-He Feng, Guangquan Cheng, Zhong Liu, Qi Wang:
Addressing the Task of Rocket Recycling with Deep Reinforcement Learning. 284-290 - Carlo Garing Inovero:
Forecasting Supplies Inventory Using Sequential Pattern Analysis. 291-294 - John Carlo Q. Agetano, Niña Angela T. Pamplona, Genoah Lee Hernia, Ingrid Carissa C. Obnial, Eugenia R. Zhuo:
Amaize: Automated Maize Seed Sowing Robot with Android Mobile Application. 295-300 - Sang-Woo Seo, Myunggyu Kim, Yejin Kim:
Efficient Sound-source Localization Method based on Direction Estimation using 2D Microphone Array. 301-306 - Twinkle Mae C. Gatbonton, Betchie E. Aguinaldo:
Employability Predictive Model Evaluator Using PART and JRip Classifier. 307-310 - Hong-wei Ma, Jianhui Wu:
An Analysis of the Anti-aliasing Property of Continuous Time ΣΔ Modulators from perspective of Time Domain. 311-315 - Junghoon Lee, Gyung-Leen Park:
Charger reservation scheme for electric vehicles based on stable marriage problem adaptation. 316-319 - Qing Wu, Weigang Xu, Weijun Huang:
Applications of An Improved Electromagnetism-like Mechanism Algorithm in Optimization of Processing Parameters. 320-325 - Yudong Du, Yunhong Zhou, Aimin Zhang, Yang Yu, Weipeng Yang, Hang Zhang:
The Design and Implementation of Control Strategy and Power Modular for STATCOM Application. 326-332
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.