Table of Contents - Part I
|
|
- David Cole
- 5 years ago
- Views:
Transcription
1 Table of Contents - Part I Workshop on Geographical Analysis, Urban Modeling, Spatial statistics (GEO-AN-MOD 2009) Using Causality Relationships for a Progressive Management of Hazardous Phenomena with Sensor Networks 1 Nafaa Jabeur and Hedi Haddad Design and Development of an Intelligent Extension for Mapping Landslide Susceptibility Using Artificial Neural Network 17 Mohammad H. Vahidnia, Ali A. Alesheikh, Abbas Alimohammadi, and Farhad Hosseinali Integrating Fuzzy Logic and GIS Analysis to Assess Sediment Characterization within a Confined Harbour 33 Nicoletta Gazzea, Andrea Taramelli, Emiliana Valentini, and Maria Elena Piccione Integrated Geological, Geomorphological and Geostatistical Analysis to Study Macroseismic Effects of 1980 Irpinian Earthquake in Urban Areas (Southern Italy) 50 Maria Danese, Maurizio Lazzari, and Beniamino Murgante Using GIS to Develop an Efficient Spatio-temporal Task Allocation Algorithm to Human Groups in an Entirely Dynamic Environment Case Study: Earthquake Rescue Teams 66 Ali Reza Vafaeinezhad, Ali Asghar Alesheikh, Majid Hamrah, Reza Nourjou, and Rouzbeh Shad A GIS-Based SW Prototype for Emergency Preparedness Management Applied to a Real Case Study 79 Marco Scaioni, Mario Alba, Renato Rota, and Simona Caragliano Spatial Analysis of Humidity and Temperature of Iran 94 Amir Kavousi and Mohammad Reza Meshkani An Evaluation of the Performance of the CHIMERE Model over Spain Using Meteorology from MM5 and WRF Models 107 Marta G. Vivanco, Inmaculada Palomino, Fernando Martin, Magdalena Palacios, Oriol Jorba, Pedro Jiménez, José María Baldasano, and Oier Azula Parameter-Less GA Based Crop Parameter Assimilation with Satellite Image 118 Shamim Akhter, Keigo Sakamoto, Yann Chemin, and Kento Aida Bibliografische Informationen digitalisiert durch
2 XIV Table of Contents - Part I Compactness and Flow Minimization Requirements in Reforestation Initiatives: An Integer Programming (IP) Formulation 132 Pablo Vanegas, Dirk Cattrysse, and Jos Van Orshoven Application of the Urban Green Assessment Model for the Korean Newtowns 148 Sangkeun Eom and Seungil Lee Modeling Un-authorized Land Use Sprawl with Integrated Remote Sensing-GIS Technique and Cellular Automata 163 Norzailawati Mohd. Noor and Mazlan Hashim A Study on the Driving Forces of Urban Expansion Using Rough Sets 176 Yong Ge and Feng Cao Assessing the Impact of Individual Attitude towards Otherness on the Structure of Urban Residential Space: A Multi-actor Model 189 André Ourednik Incorporation of Morphological Properties of Buildings' Descriptors Computed from GIS and LIDAR Data on an Urban Multi-agent Vector Based Geo-simulator 205 Claudio Carneiro, Vitor Silva, and François Golay A Spatial Structural and Statistical Approach to Building Classification of Residential Function for City-Scale Impact Assessment Studies 221 Dimitrios P. Triantakonstantis and Stuart L. Barr Spatial Distribution of Social Benefit Given by Urban Attractions: A Test of UrAD Model 237 Luca D'Acci Economic Evaluation and Statistical Methods for Detecting Hot Spots of Social and Housing Difficulties in Urban Policies 253 Silvestro Montrone, Massimo Bilancia, Paola Perchinunno, and Carmelo Maria Torre An Urban Study of Crime and Health Using an Exploratory Spatial Data Analysis Approach 269 Su- Yin Tan and Robert Haining Geospatial Crime Scene Investigation - From Hotspot Analysis to Interactive 3D Visualization 285 Markus Wolff and Hartmut Asche Agent-Based Distributed Component Services in Spatial Modeling 300 Allan J. Brimicom.be, Yang Li, Abdullah Al-Zakwani, and Chao Li
3 Table of Contents - Part I XV A Cellular Automata-Ready GIS Infrastructure for Geosimulation and Territorial Analysis 313 Ivan Blecic, Andrea Borruso, Arnaldo Cecchini, Antonio D'Argenio, Fabio Montagnino, and Giuseppe A. Trunfio An Integrated Methodology for Medieval Landscape Reconstruction: The Case Study of Monte Sérico 328 Maria Danese, Marilisa Biscione, Rossella Coluzzi, Rosa Lasaponara, Beniamino Murgante, and Nicola Masini Neural Network Based Cellular Automata Model for Dynamic Spatial Modeling in GIS 341 Yogesh Mahajan and Parvatham Venkatachalam A Model-Based Scan Statistics for Detecting Geographical Clustering of Disease 353 Massimo Bilancia, Silvestro Montrone, and Paola Perchinunno New Prospects in Territorial Resource Management: The Semantic Web GIS 369 Ernesto Marcheggiani, Michèle Nucci, and Andrea Galli Analysing the Role of Accessibility in Contemporary Urban Development 385 Henning Sten Hansen An Indoor Crowd Simulation Using a 2D-3D Hybrid Data Model 397 Chulmin Jun and Hyeyoung Kim Measuring Effectiveness of Pedestrian Facilities Using a Pedestrian Simulation Model 413 Seunjae Lee, Seunjun Lee, and Shinhae Lee Impact of the Norm on Optimal Locations 426 Marc Ciligot-Travain and Didier Josselin Designing Road Maintenance Data Model Using Dynamic Segmentation Technique 442 Mohammad Reza Jelokhani-Niaraki, AH Asghar Alesheikh, Abbas Alimohammadi, and Abolghasem Sadeghi-Niaraki GeoSOM Suite: A Tool for Spatial Clustering 453 Roberto Henriques, Fernando Baçâo, and Victor Lobo Handling Spatial-Correlated Attribute Values in a Rough Set 467 Hexiang Bai and Yong Ge Rough Qualitative Spatial Reasoning Based on Rough Topology 479 Anahid Bassiri, Mohammad R. Malek, and Ali A. Alesheikh
4 XVI Table of Contents - Part I An Integrative Approach to Geospatial Data Fusion 490 Silvija Stankutè and Hartmut Asche Designing Data Warehouses for Geographic OLAP Querying by Using MDA 505 Octavio Glorio and Juan Trujillo Turning Point Clouds into 3d Models: The Aqueduct of Segovia 520 Juan Mancera-Taboada, Pablo Rodriguez-Gonzálvez, and Diego González-Aguilera Design and Implementation of a GSM Based Automatic Vehicle Location System 533 Ali Mousavi, Mohammad A. Rajabi, and Mohammad Akbari Temporal Relationships between Rough Time Intervals 543 Anahid Bassiri, Mohammad R. Malek, Ali A. Alesheikh, and Pouria Amirian Inverse Transformation for Several Pseudo-cylindrical Map Projections Using Jacobian Matrix 553 Cengizhan Ipbuker Workshop on Wireless and Ad Hoc Networking (WAD 2009) A Cluster-Based Mobility Model for Intelligent Nodes 565 Morteza Romoozi, Hamideh Babaei, Mahmood Fathy, and Mojtaba Romoozi A Scalability Analysis of TDMA-Based Ad Hoc MAC Protocols 580 Sang-Chul Kim and Chong-Woo Woo Noun and Keyword Detection of Korean in Ubiquitous Environment Seong-Yoon Shin, Oh-Hyung Kang, Sang-Joon Park, Jong-Chan Lee, Seong-Bae Pyo, and Yang- Won Rhee Phased Scene Change Detection in Ubiquitous Environments 604 Seong-Yoon Shin, Ji-Hyun Lee, Sang-Joon Park, Jong-Chan Lee, Seong-Bae Pyo, and Yang- Won Rhee A File Carving Algorithm for Digital Forensics 615 Deok-Gyu Park, Sang-Joon Park, Jong-Chan Lee, Si-Young No, and Seong-Yoon Shin Data Discovery and Related Factors of Documents on the Web and the Network 627 Hyun-Joo Moon, Sae-Hun Yeom, Jongmyung Choi, and Chae-Woo Yoo
5 Table of Contents - Part I XVII Thorough Analysis of IEEE EDCA in Ring Topology Scenarios with Hidden and Exposed Nodes 636 Katarzyna Kosek, Marek Natkaniec, and Luca Vollem Issues for Applying Instant Messaging to Smart Home Systems 649 Jongmyung Choi, Sangjoon Park, Hoon Ko, Hyun-Joo Moon, and Jongchan Lee The Scheme of Handover Performance Improvement in WiBro 662 Wongil Park Workshop on PULSES V- Logical, Scientific and Computational Aspects of Pulse Phenomena in Transitions (PULSES 2009) Study of the Correlation between the Concrete Wall Thickness Measurement Results by Ultrasonic Pulse Echo and the PTF Model for Assymetrical Functions 671 Ludan Pusca Detection Weak Period Signal Using Chaotic Oscillator 685 Qizhong Liu and Wanqing Song Energy Metrics and Sustainability 693 Mory Ghomshei and Francesco Villecco The Ultrasonic Measurement for Object Vibration 699 Li-Ping Zhang and Qiu Yu The Generalized Wavelets Based on Meyer Wavelet 708 Xudong Teng and Xiao Yuan Reconstructing Microwave Near-Field Image Based on the Discrepancy of Radial Distribution of Dielectric Constant 717 Zhifu Tao, Qifeng Pan, Meng Yao, and Ming Li Fractals Based on Harmonic Wavelets 729 Carlo Cattani Modelling Hodgkin-Huxley Neurons Interaction 745 Gianni Mattioli and Massimo Scalia Workshop on High-Performance Computing and Information Visualization (HPCIV 2009) Fourth Order Approximation with Complexity Reduction Approach for the Solution of Time Domain Maxwell Equations in Free Space 752 Mohammad Khatim Hasan, Mohamed Othman, Zulkifly Abbas. Jumat Sulaiman, and Fatimah Ahmad
6 XVIII Table of Contents - Part I Nine Point-EDGSOfl: Iterative Method for the Finite Element Solution of 2D Poisson Equations 764 Jumat Sulaiman, Mohamed Othman, and Mohammad Khatim Hasan An Online and Predictive Method for Grid Scheduling Based on Data Mining and Rough Set 775 Asgarali Bouyer, Mohammadbagher Karimi, and Mnsour Jalali A Survey of Cloud Platforms and Their Future 788 Milad Pastaki Rad, Ali Sajedi Badashian, Gelare Meydanipour, Morteza Ashurzad Delcheh, Mahdi Alipour, and Hamidreza Afzali Workshop on Sensor Network and its Applications (SNA 2009) An Efficient Clustering Protocol with Reduced Energy and Latency for Wireless Sensor Networks 797 A. Allirani and M. Suganthi Dynamic Threshold Control-Based Adaptive Message Filtering in Mobile Sensor Networks 810 Sung Ho Jang, Yong Beam Ma, and Jong Sik Lee Design of a Reliable Traffic Control System on City Area Based on a Wireless Network 821 Junghoon Lee, In-Hye Shin, and Cheol Min Kim Design of a Cache Management Scheme for Gateways on the Vehicular Telematics Network 831 Junghoon Lee, In-Hye Shin, Gyung-Leen Park, Ik-Chan Kim, and Yoon-Jung Rhee An Efficient Topology Control and Dynamic Interval Scheduling Scheme for 6L0WPAN 841 Sun-Min Hwang and Eui-Nam Huh Relationship Based Privacy Management for Ubiquitous Society 853 Yuan Tian, Biao Song, and Eui-Nam Huh Real-Time Monitoring of Ubiquitous Wearable ECG Sensor Node for Healthcare Application 868 Do-Un Jeong and Hsein-Ping Kew Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment 885 Seong-Soo Park, Jong-Hyouk Lee, and Tai-Myoung Chung
7 Table of Contents - Part I XIX Workshop on Collective Evolutionary Systems (IWCES 2009) A Triangular Formation Strategy for Collective Behaviors of Robot Swarm 897 Xiang Li, M. Fikret Ercan, and Yu Fai Fung P2P Incentive Mechanism for File Sharing and Cooperation 912 Junghwa Shin, Taehoon Kim, and Sungwoo Tak Modeling Agents' Knowledge in Collective Evolutionary Systems 924 Rajdeep Niyogi and Alfredo Milani Collective Evolutionary Indexing of Multimedia Objects 937 C.H.C. Leung, W.S. Chan, and J. Liu A Hybrid Approach for Selecting Optimal COTS Products 949 Pankaj Gupta, Mukesh Kumar Mehlawat, Garima Mittal, and Shilpi Verma Author Index 963
8 Table of Contents - Part II Workshop on Software Engineering Processes and Applications (SEPA 2009) Ontology-Based Requirements Conflicts Analysis in Activity Diagrams 1 Chi-Lun Liu Resource Allocation Optimization for GSD Projects 13 Supraja Doma, Larry Gottschalk, Tetsutaro Uehara, and Jigang Liu Verification of Use Case with Petri Nets in Requirement Analysis 29 Jinqiang Zhao and Zhenhua Duan Towards Guidelines for a Development Process for Component-Based Embedded Systems 43 Rikard Land, Jan Carlson, Stig Larsson, and Ivica Crnkovic Effective Project Leadership in Computer Science and Engineering 59 Ferid Cafer and Sanjay Misra Weyuker's Properties, Language Independency and Object Oriented Metrics 70 Sanjay Misra Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009) Lattice Constant Prediction of A 2 BB'O6 Type Double Perovskites 82 Abdul Majid, Muhammad Farooq Ahmad, and Tae-Sun Choi A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients 93 Alessandro Costantini, Noelia Faginas Lago, Antonio Lagana, and Fermín Huarte-Larrañaga A Grid Implementation of Direct Quantum Calculations of Rate Coefficients 104 Alessandro Costantini, Noelia Faginas Lago, Antonio Lagana, and Fermín Huarte-Larrañaga A Grid Implementation of Chimère: Ozone Production in Central Italy 115 Antonio Lagana, Stefano Crocchianti, Alessandro Costantini, Monica Angelucei, and Marco Vecchiocattivi
9 XXII Table of Contents - Part II Workshop on Internet Communication Security (WICS 2009) MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT 130 Sergio Pozo, A.J. Várela-Vaca, and Rafael M. Gasea Testing Topologies for the Evaluation of IPSEC Implementations 145 Fernando Sánchez-Chaparro, José M. Sierra, Oscar Delgado-Mohatar, and Amparo Fúster-S'abater Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key 155 Miguel Viedma Astudillo, Jesús Téllez Isaac, Diego Suarez Touceda, and Héctor Plaza López Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009) Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-Server Environment 164 Youngsook Lee and Dongho Won Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords 173 Junghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik, and Ung Mo Kim Smart Card Based AKE Protocol Using Biometrie Information in Pervasive Computing Environments 182 Wansuck Yi, Seungjoo Kim, and Dongho Won A Practical Approach to a Reliable Electronic Election 191 Kwangwoo Lee, Yunho Lee, Seungjoo Kim, and Dongho Won Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key 204 Mijin Kim, Heasuk Jo, Seungjoo Kim, and Dongho Won Workshop on Mobile Communications (MC 2009) Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments 212 Eun Cheol Kim and Jin Young Kim Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System 226 Eun Cheol Kim and Jin Young Kim
10 Table of Contents - Part II XXIII Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE a WLAN under Erroneous Channel Condition 237 Bum-Gon Choi, Sueng Jae Bae, Tae-Jin Lee, and Min Young Chung A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System 250 Sueng Jae Bae, Jin Ju Lee, Bum-Gon Choi, Sungoh Kwon, and Min Young Chung Problems with Correct Traffic Differentiation in Line Topology IEEE EDCA Networks in the Presence of Hidden and Exposed Nodes 261 Katarzyna Kosek, Marek Natkaniec, and Luca Vollem Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System 276 Jong Sung Lee and Dong In Kim WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up 286 Jung-Hyun Kim, Hyeong-Joon Kwon, and Kwang-Seok Hong Overlay Ring Based Secure Group Communication Scheme for Mobile Agents 302 Hyunsu Jang, Kwang Sun Ko, Young-woo Jung, and Young Ik Eom Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems 314 Dahae Chong, Taeung Yoon, Youngyoon Lee, Chonghan Song, Myungsoo Lee, and Seokho Yoon AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization 325 Youngpo Lee, Youngyoon Lee, Taeung Yoon, Chonghan Song, Sanghun Kim, and Seokho Yoon Performance Enhancement of IEEE b WLANs Using Cooperative MAC Protocol 335 Jin-Seong Kim and Tae-Jin Lee Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks 345 Seong-Soo Park, Jong-Hyouk Lee, and Tai-Myoung Chung On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors 361 Moonseong Kim and Matt W. Mutka
11 XXIV Table of Contents - Part II Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code 372 Taekhoon Kim and Dong In Kim Design of an Efficient Multicast Scheme for Vehicular Telematics Networks 383 Junghoon Lee, In-Hye Shin, Hye-Jin Kim, Min-Jae Kang, and Sang Joon Kim ODDUGI: Ubiquitous Mobile Agent System 393 SungJin Choi, Hyunseung Choo, MaengSoon Baik, HongSoo Kim, and EunJoung Byun Determination of the Optimal Hop Number for Wireless Sensor Networks 408 Jin Wang and Young-Koo Lee Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models 419 Viet-Duc Le, Young-Koo Lee, and Sungyoung Lee A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs 432 Jin Wang and Sungyoung Lee Analysis of Moving Patterns of Moving Objects with the Proposed Framework 443 In-Hye Shin, Gyung-Leen Park, Abhijit Saha, Ho-young Kwak, and Hanil Kim A User-Defined Index for Containment Queries in XML 453 Gap-Joo Na and Sang- Won Lee On Optimal Placement of the Monitoring Devices on Channels of Communication Network 465 Alexey Rodionov, Olga Sokolova, Anastasia Yurgenson, and Hyunseung Choo Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks 479 Seungtak Oh and Hyunseung Choo A Capacity Aware Data Transport Protocol for Wireless Sensor Network 491 Md. Obaidur Rahman, Muhammad Mostafa Monowar, and Choong Seon Hong
12 Table of Contents - Part II XXV Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs) 503 Abhijit Saha, Gyung-Leen Park, Khi-Jung Ahn, Chul Soo Kim, Bongkyu Lee, and Yoon-Jung Rhee VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE Systems 513 Junwoo Jung, Hoki Baek, and Jaesung Lim Towards Location-Based Real-Time Monitoring Systems in u-lbs 525 MoonBae Song and Hyunseung Choo General Track on Computational Methods, Algorithms and Applications A Fast Approximation Algorithm for the k Partition-Distance Problem 537 Yen Hung Chen A PSO - Line Search Hybrid Algorithm 547 Ximing Liang, Xiang Li, and M. Fikret Ercan Using Meaning of Coefficients of the Reliability Polynomial for Their Faster Calculation 557 Alexey Rodionov, Olga Rodionova, and Hyunseung Choo A Novel Tree Graph Data Structure for Point Datasets 572 Saeed Behzadi, Ali A. Alesheikh, and Mohammad R. Malek Software Dependability Analysis Methodology 580 Beoungil Cho, Hyunsang Youn, and Eunseok Lee New Approach for the Pricing of Bond Option Using the Relation between the HJM Model and the BGM Model 594 Kisoeb Park, Seki Kim, and William T. Shaw Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus 605 Xiaojuan Cai and Yonggen Gu YAO: A Software for Variational Data Assimilation Using Numerical Models 621 Luigi Nardi, Charles Sorror, Fouad Badran, and Sylvie Thiria General Track on High Performance Technical Computing and Networks CNP: A Protocol for Reducing Maintenance Cost of Structured P2P Yu Zhang, Yuanda Cao, and Baodong Cheng
13 XXVI Table of Contents - Part II A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control 653 Youqiang Guo, Zijun Zhang, and Xuezhu Pei On-Demand Chaotic Neural Network for Broadcast Scheduling Problem 664 Kushan Ahmadian and Marina Gavrilova General Track on Advanced and Emerging Applications Mining Spread Patterns of Spatio-temporal Co-occurrences over Zones 677 Feng Qian, Qinming He, and Jiangfeng He Computerized Detection of Pulmonary Nodule Based on Two- Dimensional PCA 693 Wook-Jin Choi, Abdul Majid, and Tae-Sun Choi Computational Measurements of the Transient Time and of the Sampling Distance That Enables Statistical Independence in the Logistic Map 703 Adriana Vlad, Adrian Luca, and Madalin Frunzete Future Personal Health Records as a Foundation for Computational Health 719 Robert Steele and Amanda Lo SVM Based Decision Analysis and Its Granular-Based Solving 734 Tian Yang, Xinjie Lu, Zaifei Liao, Wei Liu, and Hongan Wang Fast Object Tracking in Intelligent Surveillance System 749 Ki-Yeol Eom, Tae-Ki Ahn, Gyu-Jin Kim, Gyu-Jin Jang, and Moon-hyun Kim A Reliable Skin Detection Using Dempster-Shafer Theory of Evidence 764 Mohammad Shoyaib, Mohammad Abdullah-Al-Wadud, and Oksam Chae Video Shot Boundary Detection Using Generalized Eigenvalue Decomposition 780 Ali Amiri and Mahmood Fathy Content Quality Assessment Related Frameworks for Social Media 791 Kevin Chai, Vidyasagar Potdar, and Tharam Dillon Weighted Aspect Moment Invariant in Pattern Recognition 806 Rela Puteri Pamungkas and Siti Mariyam Shamsuddin
14 Table of Contents - Part II XXVII Multiple Object Types KNN Search Using Network Voronoi Diagram Geng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Marina Gavrilova, and Bala Srinivasan General Track on Information Systems and Information Technologies RRPS: A Ranked Real-Time Publish/Subscribe Using Adaptive QoS Xinjie Lu, Xin Li, Tian Yang, Zaifei Liao, Wei Liu, and Hongan Wang A Dynamic Packet Management in a Protocol Processor 851 Yul Chu, Amit Uppal, and Jae Sok Son On a Construction of Short Digests for Authenticating Ad Hoc Networks 863 Khoongming Khoo, Ford Long Wong, and Chu- Wee Lim Learning and Predicting Key Web Navigation Patterns Using Bayesian Models 877 Malik Tahir Hassan, Khurum Nazir Junejo, and Asim Karim A Hybrid IP Forwarding Engine with High Performance and Low Power 888 Junghwan Kim, Myeong-Cheol Ko, Hyun-Kyu Kang, and Jinsoo Kim Learning Styles Diagnosis Based on Learner Behaviors in Web Based Learning 900 Nilüfer Atman, Mustafa Murat Inceoglu, and Burak Galip Asian State of the Art in Semantic Focused Crawlers 910 Hai Dong, Farookh Khadeer Hussain, and Elizabeth Chang Towards a Framework for Workflow Composition in Ontology Tailoring in Semantic Grid 925 Toshihiro Uchibayashi, Bernady O. Apduhan, Wenny J. Rahayu, David Taniar, and Norio Shiratori Fusion Segmentation Algorithm for SAR Images Based on HMT in Contourlet Domain and D-S Theory of Evidence 937 Yan Wu, Ming Li, Haitao Zong, and Xin Wang Author Index 953
IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationA study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment
, pp.93-98 http://dx.doi.org/10.14257/astl.2015.108.20 A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment Rae Hyeon Kim, Pyung Soo Kim, Jeong Gon Kim 1 Department
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationFaculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)
Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.
More informationCollaboration System using Agent based on MRA in Cloud
Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal
More informationProxy Mobile IPv6 (PMIPv6)
Sungkyunkwan University Proxy Mobile IPv6 (PMIPv6) - Grand ICT 연구센터지원사업라이프컴패니온쉽경험을위한지능형인터랙션융합연구 - 무선포함접속방식에독립적인차세대네트워킹기술개발 SDN/NFV 기반의기업유무선통합네트워크를위한액세스기술독립적오픈소스컨트롤러개발 - 자율제어네트워킹및자율관리핵심기술개발생체모방자율제어시스템및자율관리
More informationKeywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA.
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimized Handover
More informationOpen Access Research on the Prediction Model of Material Cost Based on Data Mining
Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining
More informationA Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data
A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationSecurity-Enriched Urban Computing and Smart Grid
Tai-hoon Kim Adrian Stoica Ruay-Shiung Chang (Eds.) Security-Enriched Urban Computing and Smart Grid First International Conference, SUComS 2010 Daejeon, Korea, September 15-17, 2010 Proceedings 13 Volume
More informationResearch on Design and Application of Computer Database Quality Evaluation Model
Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the
More informationVertical Handover in Vehicular Ad-hoc Networks A Survey
Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationA Study on the IoT Sensor Interaction Transmission System based on BigData
Vol.123 (SoftTech 2016), pp.220-224 http://dx.doi.org/10.14257/astl.2016.123.41 A Study on the IoT Sensor Interaction Transmission System based on BigData Jin-Tae Park 1, Gyung-Soo Phyo 1 and Il-Young
More informationInnovative M-Tech projects list IEEE papers
Innovative M-Tech projects list IEEE-2013-14 papers 1. Analysis and Practical Considerations in Implementing Multiple Transmitters for Wireless Power Transfer via Coupled Magnetic Resonance (IEEE 2014)
More informationImproved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks
, pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of
More informationContents Part I: Mathematics and Fuzziness Bipolar Fuzzy BRK-ideals in BRK-algebras... 3 Khizar Hayat, Xiao-Chu Liu, and Bing-Yuan Cao A New Approach for Solving Fuzzy Supplier Selection Problems Under
More informationSMART ENERGY MANAGEMENT SYSTEM
International Journal of Recent Innovation in Engineering and Research Scientific Journal Impact Factor - 3.605 by SJIF e- ISSN: 2456 2084 SMART ENERGY MANAGEMENT SYSTEM Mrs Ashwini Kale 1, Mr Jeevan Ugale
More informationZigBee Routing Algorithm Based on Energy Optimization
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng
More informationLIGHTWEIGHT DESIGN OF SEAT CUSHION EXTENSION MODULES USING THE PROPERTIES OF PLASTIC AND HCA-SIMP
International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 5, May 2018, pp. 624 632, Article ID: IJMET_09_05_068 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=5
More informationTable of Contents. Pulmonary Nodule Segmentation by using 3D Deformable Model in CT Images... 1 Ji-Seok Yoon, Tae-Sun Choi
Table of Contents Pulmonary Nodule Segmentation by using 3D Deformable Model in CT Images... 1 Ji-Seok Yoon, Tae-Sun Choi A CMOS Analog Baseband for a 5GHzWLAN Direct-Conversion Receiver... 5 Mi-young
More informationApplication of isight for Optimal Tip Design of Complex Tool Holder Spindle
Application of isight for Optimal Tip Design of Complex Tool Holder Spindle WMSCI 2010 Author: Koo Hong Kwon Won Jee Chung Ki Beom Park School of Mechatronics, Changwon National University Email: goodgoohong@hanmail.net
More informationApplicability Estimation of Mobile Mapping. System for Road Management
Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1407-1414 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49173 Applicability Estimation of Mobile Mapping System for Road Management
More informationWhite Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017
White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 Call for Authors This call for authors seeks contributions from academics and scientists who are in the fields of
More informationDesign and Performance Improvements for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks
Design and Performance Improvements for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks Xingyan Li and Lynne E. Parker Distributed Intelligence Laboratory, Department of Electrical Engineering
More informationThe Improved WCMRP Protocol for Mobile Wireless Sensor Networks
152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,
More informationA SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang
More informationInternational Journal Of Engineering And Computer Science ISSN: Volume 2 Issue 9 September 2013 Page No.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 9 September 2013 Page No. 2885-2888 A Survey of Various Method to improve the throughput of Zigbee Cluster
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationResearch Article. Three-dimensional modeling of simulation scene in campus navigation system
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2013, 5(12):103-107 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Three-dimensional modeling of simulation scene
More informationProviding Security to the Architecture of Presence Servers
Providing Security to the Architecture of Presence Servers Vimitha R Vidhya Lakshmi PG Scholar TKM Institute of Technology Kollam, Kerala, India Anju J Assistant Professor TKM Institute of Technology Kollam,
More informationMinimizing Thin Glass Deflection in Flexible Display Manufacturing via Pin Map Optimization
Minimizing Thin Glass Deflection in Flexible Display Manufacturing via Pin Map Optimization Nam Hoon Jo BS. Scholar, Department of Mechanical Engineering, Graduate School Kongju National University (KNU),
More informationPreface List of Acronyms
Contents Preface List of Acronyms xxi Chapter 1 Next Generation Wireless Technologies 1 1.1 Introduction 1 1.2 Wireless Networking Standardization Process 5 1.2.1 Wireless Personal Area Networks 5 1.2.2
More informationReliable and Efficient flooding Algorithm for Broadcasting in VANET
Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,
More informationThe simulation and emulation verification that was based on NS-2
210 The simulation and emulation verification that was based on NS-2 Ju-Young Shin, Jong-Wook Jang, Jin-Man Kim Department of Computer Engineering Dong-Eui University, Busan, Korea Department of Computer
More informationGeospatial Information Service Based on Ad Hoc Network
I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling
More informationDOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE
DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled
More informationComparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques
Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques 1 Himanshu Verma, Mr Tarun Rathi, 3 Mr Ashish Singh Chauhan 1 Research Scholar, Deptt of Electronics and
More informationTO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL
TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,
More informationAn Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage
, pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2
More informationICONI & APIC-IST 2010, December Crimson Resort, Mac tan Island, Philippines. Host by
KOREAN SOCIETY FOR INTERNET INFORMATION ICONI & APIC-IST 2010, December 16 20 Crimson Resort, Mac tan Island, Philippines Conference Program Host by Korean Society for Internet Information (KSII) Korea
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationThe Study of Genetic Algorithm-based Task Scheduling for Cloud Computing
The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing Sung Ho Jang, Tae Young Kim, Jae Kwon Kim and Jong Sik Lee School of Information Engineering Inha University #253, YongHyun-Dong,
More informationAvailable online at ScienceDirect. Procedia Computer Science 56 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 56 (2015 ) 266 270 The 10th International Conference on Future Networks and Communications (FNC 2015) A Context-based Future
More informationUPnP-Based Telematics Service Discovery for Local Hot-Spots
UPnP-Based Telematics Service Discovery for Local Hot-Spots Dong-Kyun Kim and Sang-Jeong Lee Dept. of Computer Science and Engineering, Soonchunhyang University Asan, Chungnam, Korea {kdk7, sjlee}@sch.ac.kr
More informationPower Control Performance Evaluation for Efficiency in D2D Cellular Network
Power Control Performance Evaluation for Efficiency in D2D Cellular Network Soo Hyeong Kang, Jeong Gon Kim* Department of Electronic Engineering, Korea Polytechnic University, Siheung Si, Gyeonggi Do,
More informationOverview of Mobile Networking Initiatives at WINLAB
Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point
More informationAN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION
AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION Xue-Min Lu 1,3, Sendo Wang 2 1 Master Student, 2 Associate Professor
More information2017 International Conference on Communication Technologies (ComTech 2017)
2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute
More informationAN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide
AN INTRODUCTION TO FUZZY SETS Analysis and Design Witold Pedrycz and Fernando Gomide A Bradford Book The MIT Press Cambridge, Massachusetts London, England Foreword - Preface Introduction xiii xxv xxi
More informationReliable Routing In VANET Using Cross Layer Approach
Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,
More information3D Grid Size Optimization of Automatic Space Analysis for Plant Facility Using Point Cloud Data
33 rd International Symposium on Automation and Robotics in Construction (ISARC 2016) 3D Grid Size Optimization of Automatic Space Analysis for Plant Facility Using Point Cloud Data Gyu seong Choi a, S.W.
More informationINTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT
MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,
More informationDistinguished Capabilities of Artificial Intelligence Wireless Communication Systems
Distinguished Capabilities of Artificial Intelligence Wireless Communication Systems Xiaohu Ge, Senior Member, IEEE School of Electronic Information and Communications Huazhong University of Science and
More informationAN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH
AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH Sai Tejaswi Dasari #1 and G K Kishore Babu *2 # Student,Cse, CIET, Lam,Guntur, India * Assistant Professort,Cse, CIET, Lam,Guntur, India Abstract-
More informationMultimedia Big Data Frame Combination Storage Strategy Based on Virtual Space Distortion
Multimedia Big Data Frame Combination Storage Strategy Based on Virtual Space https://doi.org/0.399/ijoe.v3i02.66 Jian Luo Zhejiang Technical Institute of Economics, Hangzhou Zhejiang, China jiansluo@yahoo.com
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationApplication Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography
, pp.37-41 http://dx.doi.org/10.14257/astl.2013.31.09 Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography Lanying Li 1, Yun Zhang 1, 1 School of Computer Science and Technology
More informationCOMBINING HIGH SPATIAL RESOLUTION OPTICAL AND LIDAR DATA FOR OBJECT-BASED IMAGE CLASSIFICATION
COMBINING HIGH SPATIAL RESOLUTION OPTICAL AND LIDAR DATA FOR OBJECT-BASED IMAGE CLASSIFICATION Ruonan Li 1, Tianyi Zhang 1, Ruozheng Geng 1, Leiguang Wang 2, * 1 School of Forestry, Southwest Forestry
More informationKeywords: Cloud computing, ZigBee, Smart home, Security cloud
2016 International Conference on Information Engineering and Communications Technology (IECT 2016) ISBN: 978-1-60595-375-5 Design of the Smart-home Security System based on Cloud Computing Yan Wang 1,a,
More informationUrban Scene Segmentation, Recognition and Remodeling. Part III. Jinglu Wang 11/24/2016 ACCV 2016 TUTORIAL
Part III Jinglu Wang Urban Scene Segmentation, Recognition and Remodeling 102 Outline Introduction Related work Approaches Conclusion and future work o o - - ) 11/7/16 103 Introduction Motivation Motivation
More informationAuthenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,
More informationA Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation
, pp.162-167 http://dx.doi.org/10.14257/astl.2016.138.33 A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation Liqiang Hu, Chaofeng He Shijiazhuang Tiedao University,
More informationEfficient Windows Query Processing with. Expanded Grid Cells on Wireless Spatial Data. Broadcasting for Pervasive Computing
Contemporary Engineering Sciences, Vol. 7, 2014, no. 16, 785 790 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4691 Efficient Windows Query Processing with Expanded Grid Cells on Wireless
More informationAn Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing
More informationOne Communication Key Udate with Whitelist Attribute in SCADA System
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 3, May 2016 One Communication Key Udate with Whitelist Attribute in SCADA
More informationEigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet
Eigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet Chidambar P.Inamdar Research Scholar, Bharathiar Uniniversity, Coimabatore Abstract-Mobile node communication
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationMobile Edge Computing for 5G: The Communication Perspective
Mobile Edge Computing for 5G: The Communication Perspective Kaibin Huang Dept. of Electrical & Electronic Engineering The University of Hong Kong Hong Kong Joint Work with Yuyi Mao (HKUST), Changsheng
More informationContents. Foreword to Second Edition. Acknowledgments About the Authors
Contents Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments About the Authors xxxi xxxv Chapter 1 Introduction 1 1.1 Why Data Mining? 1 1.1.1 Moving toward the Information Age 1
More informationCryptography basedauthentication method for DoS attack Detection in Clustered Wireless Sensor Networks
Cryptography basedauthentication method for DoS attack Detection in Clustered Wireless Sensor Networks Jerine.S 1, Dr.Julia Punitha Malar Dhas 2 1. Research Scholar, Department of Computer Applications,
More informationMODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS
MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,
More informationTable of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17
Table of Contents 1 Introduction...1 1.1 Common Problem...1 1.2 Data Integration and Data Management...3 1.2.1 Information Quality Overview...3 1.2.2 Customer Data Integration...4 1.2.3 Data Management...8
More informationCooperative Spectrum Sharing Scheme for Wireless Sensor Networks
Cooperative Spectrum Sharing Scheme for Wireless Sensor Networks Tshimangadzo M. Tshilongamulenzhe 1, Topside E. Mathonsi, member IAENG 2 and Maredi I. Mphahlele 3 Department of Information Technology,
More informationTelematics Transport Gateway for Telematics Systems. Independent on Mobile Networks
Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,
More informationMobile Computing. Homework#1 Due date: Oct.25, 2018 NOTE: WRITE YOUR ANSWERS IN ENGLISH. ID#: Name: (Kor.) (Eng.)
Mobile Computing Homework#1 Due date: Oct.25, 2018 NOTE: WRITE YOUR ANSWERS IN ENGLISH. ID#: Name: (Kor.) (Eng.) Problem #1 (20pts). Answer the following questions based on your knowledge. 1) In Data-Link
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi
ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES xv LIST OF FIGURES xviii LIST OF SYMBOLS AND ABBREVIATIONS xxi 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 WEB CACHING 2 1.2.1 Classification
More informationWide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks
Wide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks Soomi Yang 1*, Heejung Byun 2 1 Department of Information Engineering, the University of Suwon, Hwasung-si, Gyeonggido,
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationAUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS
AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS Nilam B. Lonkar 1, Dinesh B. Hanchate 2 Student of Computer Engineering, Pune University VPKBIET, Baramati, India Computer Engineering, Pune University VPKBIET,
More informationYEONG HO HA. DATE OF BIRTH August 10, 1953
YEONG HO HA PRESENT POSITION AND ADDRESS Professor School of Electronics Engineering Kyungpook National University 80 Daehak-ro, Buk-gu, Daegu 41566, Korea Phone: +82-53-950-5535 FAX: +82-53-950-5505 E-MAIL:
More informationA Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks
A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks Saeed Fathi Ghiri 1 and Morteza Rahmani and Hassan Almasi 2 1 Department of Computer Engineering, Azad University
More informationSK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher
ISSN: 2394 3122 (Online) Volume 2, Issue 1, January 2015 Research Article / Survey Paper / Case Study Published By: SK Publisher P. Elamathi 1 M.Phil. Full Time Research Scholar Vivekanandha College of
More informationA Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG
2017 2nd International Conference on Advances in Management Engineering and Information Technology (AMEIT 2017) ISBN: 978-1-60595-457-8 A Test Sequence Generation Method Based on Dependencies and Slices
More informationDevelopment of MF-TDMA based Satellite Network System Simulation Model
International Global Navigation Satellite Systems Society IGNSS Symposium 2011 University of New South Wales, Sydney, NSW, Australia 15 17 November 2011 Development of MF-TDMA based Satellite Network System
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationPre-Qual Groups. EL GOUNA WORLD CUP 03 till 09 December Hurghada (EG) Group Match players T-car T-Inn T-car T-Inn Av MP 1st HR 2nd HR A
A ANDERSEN Thomas 30 24 30 24 1.250 2 4 3 KIYOTA Atsushi 14 24 14 24 0.583 0 2 2 CHRISTIANI Dave 30 22 30 22 1.363 2 8 3 KIYOTA Atsushi 12 22 12 22 0.545 0 3 2 CHRISTIANI Dave 29 28 29 28 1.035 0 6 3 ANDERSEN
More informationNowadays data-intensive applications play a
Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Data Replication-Based Scheduling in Cloud Computing Environment Bahareh Rahmati 1, Amir Masoud Rahmani 2 Received (2016-02-02) Accepted
More information2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008
2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS
More informationA Study on Different Challenges in Facial Recognition Methods
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521
More informationMultimedia Document Communications over Wireless Network
Multimedia Document Communications over Wireless Network 1 Convergence of Mobile Services Personal computer Access to any data Internet Telecommunications Mobile Technology Ubiquitous Portable processing
More informationResearch on Power Quality Monitoring and Analyzing System Based on Embedded Technology
2010 China International Conference on Electricity Distribution 1 Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology Zhang Hong-tao, Ye Ying, An Qing China Zhoukou Power
More informationCollaborative Security Attack Detection in Software-Defined Vehicular Networks
Collaborative Security Attack Detection in Software-Defined Vehicular Networks APNOMS 2017 Myeongsu Kim, Insun Jang, Sukjin Choo, Jungwoo Koo, and Sangheon Pack Korea University 2017. 9. 27. Contents Introduction
More informationRoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)>
RoboCup 2014 Rescue Simulation League Team Description Fu Jiang, Jun Peng, Xiaoyong Zhang, Tao Cao, Muhong Guo, Longlong Jing, Zhifeng Gao, Fangming Zheng School of Information Science
More informationComprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority
IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:
More informationEfficient Uplink Scheduler Architecture of Subscriber Station in IEEE System
Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer
More information