default search action
13th IMIS 2019: Sydney, NSW, Australia
- Leonard Barolli, Fatos Xhafa, Omar Khadeer Hussain:
Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2019), Sydney, NSW, Australia, 3-5 July 2019. Advances in Intelligent Systems and Computing 994, Springer 2020, ISBN 978-3-030-22262-8
The 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2019)
- Osama Alfarraj, Ahmad Ali AlZubi, Salem Alkhalaf, Thamer Alhussain, Asma AlKhalaf:
Modified Algorithm for Enhancing the Performance of Grid Systems in Task Scheduling. 3-10 - Donald Elmazi, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based System for Actor Node Selection in WSANS: Simulation and Experimental Results. 11-24 - Seiji Ohara, Admir Barolli, Shinji Sakamoto, Leonard Barolli:
Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Load Balancing and Client Uniform Distribution. 25-38 - Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto:
Performance Evaluation of WMNs by WMN-PSOHC System Considering Random Inertia Weight and Linearly Decreasing Inertia Weight Replacement Methods. 39-48 - Ghulam Hafeez, Nadeem Javaid, Muhammad Riaz, Umar Khalid, Zafar Iqbal, Ammar Ali:
An Innovative Model Based on FCRBM for Load Forecasting in the Smart Grid. 49-62 - Shigenari Nakamura, Tomoya Enokido, Leonard Barolli, Makoto Takizawa:
Capability-Based Information Flow Control Model in the IoT. 63-71 - Yinzhe Guo, Ryuji Oma, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Evaluation of a Two-Way Tree-Based Fog Computing (TWTBFC) Model. 72-81 - Wahab Khan, Hua Wang, Muhammad Ayaz, Muhammad Shahid Anwar, Sadique Ahmad:
A Balanced Energy Efficient (BEE) Routing Scheme for Underwater WSNs. 82-93 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
The Improved Energy Consumption Laxity Based (IECLB) Algorithm to Perform Computation Processes. 94-105 - Tetsuya Shigeyasu:
Effects of Sharing Information for Available Routes by Ad-Hoc Communication on a Disaster Stricken Area. 106-113 - Takeru Kurita, Keita Matsuo, Leonard Barolli:
Design and Implementation of a Weather Measurement System Using Agile-Kanban. 114-124 - Tianhan Gao, Ying Li:
Real-Time Ray Tracing Algorithm for Dynamic Scene. 125-131 - Natwadee Ruedeeniraman, Makoto Ikeda, Leonard Barolli:
TensorFlow: A Vegetable Classification System and Its Performance Evaluation. 132-141 - Noriki Uchida, Goshi Sato, Yoshitaka Shibata:
Image Recognition Based Adaptive Array Antenna Controls for Winter Road Surveillance System in Local Mountain Area. 142-151 - Hamad Balhareth, Alsaleh Saad:
Impact of Mobile Network Operators' Incentive for Public Health: A Study Based on Saudi 2030 Vision. 152-161 - Hongxia Lu, Guidong Zhang, Yongjun Shen:
Cyber Security Situation Prediction Model Based on GWO-SVM. 162-171 - Abdul Basit Majeed Khan, Sajjad Khan, Sayed Aimal, Mudassar Khan, Bibi Ruqia, Nadeem Javaid:
Half Hourly Electricity Load Forecasting Using Convolutional Neural Network. 172-184 - Abdul Basit Majeed Khan, Nadeem Javaid, Orooj Nazeer, Maheen Zahid, Mariam Akbar, Majid Hameed Khan:
Hourly Electricity Load Forecasting in Smart Grid Using Deep Learning Techniques. 185-196 - Han Wang, Xu An Wang, Shuai Xiao, Zichen Zhou:
Blockchain-Based Public Auditing Scheme for Shared Data. 197-206 - Hyunhee Park:
Classifying Serious Depression Based on Blood Test: A Machine Learning Approach. 207-214 - Myoungsu Kim, Soonhong Kwon, Donald Elmazi, Jong-Hyouk Lee, Leonard Barolli, Kangbin Yim:
A Technical Survey on Methods for Detecting Rogue Access Points. 215-226 - Wen-Chung Tsai, Nien-Ting Huang, Song-Hao Huang, Ting-Ming Tsai:
An Implementation of LTE MAC-Layer Channel Multiplexing and Scheduling Mechanism Porting Upon an FPGA Embedded System Platform to Support Massive NB-IoT Devices Accesses. 227-235 - Jingling Zhao, Qingyang Bao, Yunze Ni:
Improved SM4 Encryption Algorithm Based on Mixed Congruence Method. 236-245 - Zhongshi Gao, Yang Su, Yi Ding, Yudong Liu, Xu An Wang, Junwei Shen:
Key Technologies of Anomaly Detection Using PCA-LSTM. 246-254 - Hamida Bano, Aroosa Tahir, Ishtiaq Ali, Raja Jalees ul Hussen Khan, Abdul Haseeb, Nadeem Javaid:
Electricity Load and Price Forecasting Using Enhanced Machine Learning Techniques. 255-267 - Silvia Angeloni, Giorgia Pontetti:
RobotFarm: A Smart and Sustainable Hydroponic Appliance for Meeting Individual and Collective Needs. 268-280 - Yi Liu, Leonard Barolli:
A Fuzzy-Based System for Decision of Sightseeing Spots Considering Different Conditions. 281-290 - Shuai Xiao, Xu An Wang, Han Wang:
Large-Scale Electronic Voting Based on Conflux Consensus Mechanism. 291-299 - Lili Jiao:
An Image Denosing Algorithm for Strong Noise Image Based on Structural Similarity of Contourlet Domain via Grey Relational Analysis. 300-309 - Tomoyuki Ishida, Hayato Ito:
Construction of a Historical Information Visualization System by Superposition of Old Map. 310-318 - Meguru Yamashita, Shingo Sasaki, Akio Doi, Kiwamu Satoh, Hajime Ogawa:
Study on Resistance Parameter Setting of Acupuncture Treatment Training System. 319-325 - Yuchen Liang, Jiangdong Deng, Baojiang Cui:
Bidirectional LSTM: An Innovative Approach for Phishing URL Identification. 326-337 - Yusuke Nozaki, Masaya Yoshikawa:
Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling Attack. 338-347 - Nico Surantha, Felix Ivan:
Secure Kubernetes Networking Design Based on Zero Trust Model: A Case Study of Financial Service Enterprise in Indonesia. 348-361 - Weiqi Li, Qian Wu, Baojiang Cui:
State-Based Fuzzing for S1AP. 362-372 - Sachula Meng, Zhihui Wang, Huixia Ding, Lili Sun, Delong Yang, Sai Wu, Xinzhi Cao, Xue Wang, Ying Wang, Yuanbin Chen:
Service-Aware Resource Allocation Based on RAN Slicing for Smart Grid. 373-384 - Haidong Kang, Tianhan Gao, Nan Guo:
A Dynamic Scene Recognition Method for Event-Based Social Network. 385-392 - Wenchuan Yang, Yifei Wang, Baojiang Cui, Chen Chen:
A Static Instrumentation Method for ELF Binary. 393-403 - Kunyoung Kim, Minhwan Kim, Jongmo Kim, Mye M. Sohn:
Personalized Topic Graph Generation Method Using Image Labels in Image-Sharing SNS. 404-415 - Cristian Alberoni, Ernesto Leon, Miguel A. Wister, José Adán Hernández-Nolasco:
Wireless Sensor Network to Collect Training Data from Cycling. 416-425
The 13th International Workshop on Advances in Information Security (WAIS-2019)
- Alsaleh Saad, Hassan Kasim Haridi, Alzabin Sulaiman, Talal Alzabni:
The Impact of Patients' Trust and Privacy on Use of Medical Mobile Applications. 429-436 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Conceptual Security System Design for Mobile Platforms Based on Human Nervous System. 437-446 - Kazuki Ikegami, Michihiro Yamada, Hiroaki Kikuchi, Koji Inui:
Development of a Cyber Incident Information Crawler. 447-455 - Avirup Dasgupta, Asif Qumer Gill, Farookh Khadeer Hussain:
A Review of General Data Protection Regulation for Supply Chain Ecosystem. 456-465 - Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding. 466-476 - Takamichi Saito, Rikita Koshiba:
Examination and Comparison of Countermeasures Against Web Tracking Technologies. 477-489
The 9th International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS-2019)
- Kun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang, Jiun-Yi Lin, Huei-Tang Luo:
A LoRaWAN Based Energy Efficient Data Encryption Method. 493-502 - Sheng-Zheng Lin, Fang-Yie Leu:
Firewall Services Provided by Edge Computers Under AMF and gNB in 5G. 503-513 - Fang-Yie Leu, Jia-Sheng Ho:
Air Pollution Source Identification by Using Neural Network with Bayesian Optimization. 514-524 - Mei-Yu Wu, Fang-Yie Leu:
MIH and CRRM Handover in Trusted or Untrusted Environments. 525-536 - Tin Maung Maung, Mie Mie Su Thwin:
Applicable Dynamic Forensics Investigation via Client-Server Architecture with MYANFOSIS. 537-545
The 9th International Workshop on Intelligent Techniques and Algorithms for Ubiquitous Computing (ITAUC-2019)
- Bibi Ruqia, Nadeem Javaid, Altaf Husain, Najeeba Muhammad Hassan, Hafiza Ghulam Hassan, Yumna Memon:
Influential Reasonable Robust Virtual Machine Placement for Efficient Utilization and Saving Energy. 549-561 - Hsing-Chung Chen, Tzu-Ya Chen, Shian-Shyong Tseng, Kang-Ming Chang, Fengming Chang, Mei-He Jiang:
The Hot Security Topics Analysis for the Announcements in ICANN Website by Using Web Crawler and Association Rule Technology. 562-571 - Shian-Shyong Tseng, Shih-Nung Chen, Tsung-Yu Yang, Edgar Chia-Han Lin:
Using CBR Approach to Enhance Collaborative Design Ability. 572-586 - Wen-Chung Tsai, Nien-Ting Huang, Ting-Ming Tsai, Te-Jen Wang:
Performance Evaluations of Packet Encapsulation Using Scatter-Gather Direct Memory Access to Support Massive Devices Accesses for NB-IoT Small Cell. 587-596 - Jianghua Cheng, Tong Liu, Yueyong Zhou, Yanye Xiong:
Road Junction Identification in High Resolution Urban SAR Images Based on SVM. 597-606
The 9th International Workshop on Future Internet and Next Generation Networks (FINGNet-2019)
- Kyungmin Lee, Hyunhee Park:
Malicious Adware Detection on Android Platform using Dynamic Random Forest. 609-617 - Hsing-Chung Chen, Bambang Irawan, Chieh-Yang Shih, Cahya Damarjati, Zon-Yin Shae, Fengming Chang:
A Smart Contract to Facilitate Goods Purchasing Based on Online Haggle. 618-628 - Yong-Hwan Lee, Wan-Bum Lee:
Object Detection and Tracking Based on Deep Learning. 629-635 - DaEun Park, Jongmo Kim, Mye M. Sohn:
Serendipity-Based Recommendation Framework for SNS Users Using Tie Strength and Relation Clustering. 636-645
The 8th International Workshop on Frontiers in Innovative Mobile and Internet Services (FIMIS-2019)
- Kanji Nakano, Noriki Uchida:
Proposal of QoS Controls by Using OpenFlow for Heterogeneous Wireless Networks Considered with the IoT Traffic Performance. 649-657 - Tianhan Gao, Song Zhou:
Emotion Recognition Scheme via EEG Signal Analysis. 658-663 - Haoyu Ji, He Xu:
A Review of Applying Blockchain Technology for Privacy Protection. 664-674 - Jingmei Zhao, Rui Chen:
Side Information Generation Algorithm Based on Weighted KSVD Dictionary. 675-681 - Hong-Mei Huang:
Controlled Quantum Dialogue Based on Logical Qubits. 682-690
The 8th International Workshop on Sustainability Management of e-Business and Ubiquitous Commerce Engineering (SMEUCE-2019)
- Shyh-Weir Tzang, Chun-Ping Chang, Yong Zulina Zubairi, Yung-Shun Tsai:
Residual Reversal Strategy: Empirical Evidence in the Taiwan Stock Market. 693-707 - Chun-Ping Chang, Yung-Shun Tsai, Sheena Kaur, Shyh-Weir Tzang:
Free Cash Flow and Firm Value. 708-716 - Shyh-Weir Tzang, Munkhzaya Usukhjargal, Chun-Ping Chang:
Social Impact Bonds (SIBs): Introduction and Cases Review. 717-726 - Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang:
Demographic Structure, Business Fluctuations, Tax Shock and Housing Bubbles. 727-737 - Kuei-Yuan Wang, Ying-Li Lin, Chien-Kuo Han, Yu-Sin Huang:
The Causes and Influences of Institutional Investors Herding Behavior in the Taiwan Stock Market. 738-748 - Mei-Hua Huang, Onnavia Laura, Bae-Ling Chen, Chiung-Yen Chen:
International Students' Career Intention-Resource Based View. 749-757 - Mei-Hua Liao, Hidekazu Sone:
Do Institutional Investors like Local Longevity Companies? 758-761 - Ying-Li Lin, Kuei-Yuan Wang, Mei-Lien Chen:
Key Success Factors of Online Learning Website A - Balanced Scorecard Perspective. 762-770 - Chai-Ju Lu, Chiou-Shya Torng:
Exploring the Design of Forestry Experience Activities by IPA. 771-780 - Shu-Chuan Lin, Chung-Hao Chen:
A Model of Chain Restaurant Organizational Achievement in Taiwan: A Structural Equation Modeling Approach. 781-790 - Ya-Lan Chan:
A Deterministic Multi-item Inventory Model with Limited Warehouse Capacity. 791-802 - Shao-Chieh Lin, Jen-Son Cheng, Shieh-Liang Chen, Chia-Ju Lu:
Innovation Strategy of Productive Farm - A Case on Taiwan Mushroom Industry. 803-812
The 7th International Workshop for Practical Issues on Security in Public Internet Services (PISPIS-2019)
- Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, Sun-Young Lee:
Novel Encryption Method of GPS Information in Image File Using Format-Preserving Encryption. 815-823 - Hyeongmin Park, Taeeun Kim, Gaeul Kim, Wonyoung Jang, Kyungroul Lee, Sun-Young Lee:
Improvement of QR Code Access Control System Based on Lamport Hash Chain. 824-833 - Kwangjun Kim, HeeDong Yang, Byeonggeun Son, Hanjae Yoon, Kangbin Yim, Manhee Lee:
A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities. 834-844 - Junghoon Park, Byeonggeun Son, Junyoung Park, Myoungsu Kim, Kangbin Yim:
Unintended Certificate Installation into Remote IoT Nodes. 845-854
The 1st International Workshop on Optical Communication and Computing (OCC-2019)
- S. Ramya, T. S. Indumathi:
Optimizing the Placement of Wavelength Converters in WDM. 857-867 - Somesh Nandi, T. S. Indumathi, R. V. Sai Priya, Aparna Kori:
Analysis of Fiber Bragg Grating Spectral Characteristics Using Couple Mode Theory for Sensor Applications. 868-879 - Tejasrikumar Kori, Amogh Kori, Akshata S. Kori, Somesh Nandi:
A Study on Fiber Bragg Gratings and Its Recent Applications. 880-889 - P. C. Shruthi, T. S. Indumathi, K. C. Jagadeesh:
Maximizing the Placement of Wavelength Converters in WDM Optical Networks Using Adaptive Equal Opportunity Genetic Algorithm. 890-901 - Harshada J. Patil, T. S. Indumathi, Preeta Sharan, Somesh Nandi:
Interpretation of Photonic Crystals with Hexagonal Symmetry. 902-912
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.