default search action
ICNCC 2018: Taipei City, Taiwan
- Proceedings of the VII International Conference on Network, Communication and Computing, ICNCC 2018, Taipei City, Taiwan, December 14-16, 2018. ACM 2018, ISBN 978-1-4503-6553-6
Machine Learning Algorithms and Applications
- Yi Liu, Dandan Zhu, Hao Liu, Aimin Du, Dong Chen, Zhihui Ye:
A Deep Learning Based Geosteering Method Assembled with "Wide-angle Eye". 1-5 - Praiya Tungjaturasopon, Krerk Piromsopa:
Performance Analysis of Machine Learning Techniques in Intrusion Detection. 6-10 - Kinza Zahra, Farooque Azam, Wasi Haider Butt, Fauqia Ilyas:
A Framework for User Characterization based on Tweets Using Machine Learning Algorithms. 11-16 - Md. Shohel Rana, Charan Gudla, Andrew H. Sung:
Evaluating Machine Learning Models for Android Malware Detection: A Comparison Study. 17-21 - Sheng-Ping Wang, Pangfeng Liu, Jan-Jan Wu:
Communication Usage Optimization of Gradient Sparsification with Aggregation in Deep Learning. 22-26 - Jiayi Shen, Fabrice Huet:
Predict the Best Graph Partitioning Strategy by Using Machine Learning Technology. 27-33 - Qianlin Wu, Dandan Zhu, Yi Liu, Aimin Du, Dong Chen, Zhihui Ye:
Comprehensive Control System for Gathering Pipe Network Operation Based on Reinforcement Learning. 34-39 - Chuan-Wen Chen, Shanq-Jang Ruan, Chang-Hong Lin, Chun-Chi Hung:
Performance Evaluation of Edge Computing-Based Deep Learning Object Detection. 40-43 - Hao Liu, Dandan Zhu, Yi Liu, Aimin Du, Dong Chen, Zhihui Ye:
A Reinforcement Learning Based 3D Guided Drilling Method: Beyond Ground Control. 44-48 - Apichaya Nimkoompai, Chan Jaruvongrangsee, Puwadol Sirikongtham:
Integration of Speech Recognition into Virtual Classroom to Enhance Learning Achievement. 49-52
Data Management and Data Mining
- Di Xue, Jingmei Li, Weifei Wu, Jiaxiang Wang, Xiaoyun Wang:
An Instruction Blocking Methods for Disk Data Protection. 53-57 - Huan Phan:
NOV-CFI: A Novel Algorithm for Closed Frequent Itemsets Mining in Transactional Databases. 58-63 - Yu-Kai Chiu, Shanq-Jang Ruan, Chung-An Shen, Chun-Chi Hung:
The Design and Implementation of a Latency-Aware Packet Classification for OpenFlow Protocol based on FPGA. 64-69 - Panthip Pooput, Pornsiri Muenchaisri:
Finding Impact Factors for Rejection of Pull Requests on GitHub. 70-76 - Xinman Zhang, Weiyong Gong, Xuebin Xu, Yuchen Zhang:
Biometric Recognition Databases: A Survey. 77-81
Computer and Information Technology
- Thuy Thi Thanh Pham, Van-Nam Hoang, Thanh Ngoc Ha:
Exploring Efficiency of Character-level Convolution Neuron Network and Long Short Term Memory on Malicious URL Detection. 82-86 - Ramya Rayacherlu Sambasadasiva Reddy, Ganesh Singh T., D. Sejal, K. R. Venugopal, S. S. Iyengar, Lalit M. Patnaik:
DRDLC: Discovering Relevant Documents Using Latent Dirichlet Allocation and Cosine Similarity. 87-91 - Tingting Zheng, Yang Liu:
Genetic Algorithm for Generating Counterexample in Stochastic Model Checking. 92-96 - Jaymer M. Jayoma, Bobby D. Gerardo, Ruji P. Medina:
Enhancing Inverse Ant Algorithm using Path Elimination Rules. 97-101 - Maik Benndorf, Marika Kaden, Frederic Ringsleben, Christian Roschke, Rico Thomanek, Martin Gaedke, Thomas Haenselmann:
Investigating the Influence of CPU Load, Memory Usage and Environmental Conditions on the Jittering of Android Devices. 102-106 - Ralph Duncan:
Designing Packetc Programming Language for Reliable Network Apps. 107-114 - Xiaoliang Tang, Xuan Tang, Wanli Wang, Li Fang, Xian Wei:
Deep Multi-view Sparse Subspace Clustering. 115-119 - Wenjia Ding, Yi Xie, Yulin Wang:
Detection and Localization of the Copy-paste in Digital Cartoon. 120-122 - Ankita Verma, Vivek Kapoor, Sangita Roy:
Efficient Copy-Move Forgery Detection using Blur and Rotation Invariant Technique. 123-127 - Yang Xie, Xiaolu Zhou, Gongliang Li, Yizheng Tao:
Research on the Application Cluster Architecture for the New Computing Environment. 128-132 - Keishi Tsukada, Fumihiko Ino:
A Method for Estimating Task Granularity for Automating GPU Cycle Sharing. 133-139
Information System and Security
- Reynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina:
A Modified Approach of Blowfish Algorithm Based On S-Box Permutation using Shuffle Algorithm. 140-145 - Wen Wen Koh, Chuah Chai Wen:
On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions. 146-151 - Amirisetti Sushma, Teerapat Sanguankotchakorn:
Implementation of IPsec VPN with SIP Softphones using GNS3. 152-156 - Takuo Hayakawa, Ryôichi Sasaki, Hiroshi Hayashi, Yuji Takahashi, Tomoko Kaneko, Takao Okubo:
Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT. 157-164 - Gridaphat Sriharee, Niti Boonyakaite, Wachiraphan Charoeanwet, Pattarakorn Summat, Pimphaka Saikhow:
Integrating Bluetooth-Low Energy to Support Visitor Recommendation and Space Management. 165-170
Communication and Information Engineering
- Wei Wei, Junghwan Kim:
Modeling and Analysis of the Anti-Jamming (AJ) Spread Spectrum System Using Quantized Chaotic Sequence with LDPC for Reliable Data Link. 171-176 - Zhengping Zhang, Jian Wang:
MCAR: Multi-Path-Based Collusion Avoidance Routing for Wireless Ad-Hoc Networks. 177-181 - Tek Yong Lim, Fang-Fang Chua, Bushra Binti Tajuddin:
Elicitation Techniques for Internet of Things Applications Requirements: A Systematic Review. 182-188 - Kaikai Wang, Kaixin Zhang:
Performance Analysis of Full Duplex Network Based on Non-orthogonal Multiple Access. 189-193 - Hanan H. Al Malki, Abdellatif I. Moustafa:
An Enhanced technique of Self-Correcting Localization Algorithm for Vehicular Node Position Accuracy in the Distributed VANET. 194-199 - Fauqia Ilyas, Farooque Azam, Wasi Haider Butt, Kinza Zahra:
A Novel Method for Inferring Person-to-person Relationship Using Wi-Fi. 200-205 - Tingru Zhu, Zhiguo Ren, Yan Zhang:
A Compact Wideband Bandpass Filter Implemented with Triple-mode Stepped Impedance Stubs Resonator and Substrate Integrated Coaxial Line Technology. 206-210
Target Detection and Tracking
- Maria Jeseca C. Baculo, Nelson Marcos:
Automatic Mango Detection using Image Processing and HOG-SVM. 211-215 - Nayuta Ono, Kiyoshi Hoshino:
Method for Measuring Rotational Eye Movement by Tracking Eye Vascular Images Using luminance Gradient Information. 216-220 - Seongmin Baek, Myunggyu Kim:
Real-Time Tracking IDs and Joints of Users. 221-226 - Chengyang Li, Liping Zhu, Dandan Zhu, Jiale Chen, Zhanghui Pan, Xue Li, Bing Wang:
End-to-end Multiplayer Violence Detection based on Deep 3D CNN. 227-230
Biometric Technology
- Xinman Zhang, Dongxu Cheng, Xuebin Xu:
A Novel Robust Multispectral Palmprint Recognition Algorithm Based on P-Norm Regularization. 231-235 - Byung-Hoon Lee, Tea-Yeong Hah, Won Ho Jeong, Kyung-Seok Kim:
Enhanced Approach for Finger-Vein Extraction. 236-241 - Xinman Zhang, Kunlei Jing, Guoqi Yan, Xuebin Xu, Weiyong Gong:
Research of Palmprint Authentication Arithmetic Based on Smartphone. 242-246 - Dongpeng Shang, Xinman Zhang, Xuebin Xu, Xiangyang Peng:
Speaker Recognition Based on Lip-reading: An Overview. 247-251
Image Processing Technology and Method
- Jay Tzu-Chieh Lee, Shuo-Fang Liu:
Using QFD as an Information Tool for Artistic Style Creation: A Case Study of Naturalism to Otaku Style Works. 252-260 - Pang Ying Han, Khor Ean Yee, Shih Yin Ooi:
Localized Temporal Representation in Human Action Recognition. 261-266 - Nutchanun Chinpanthana, Tejtasin Phiasai:
Spatial Semantic Images with Relationship Contents by Using Convolutional Neural Network and Support Vector Machine. 267-272 - Jay Tzu-Chieh Lee, Shuo-Fang Liu:
Applying QFD Method to Develop Ceramic Products by Two Artists: A Case of Art Tiles. 273-277 - Liang Shan, Deyang Liu, Ping An, Xinpeng Huang:
Research on Subjective Quality Assessment of Light Field Images. 278-282 - Xinman Zhang, Jiayu Zhang, Xuebin Xu:
An Efficient Image-ELM-Based Chip Classification Algorithm. 283-287 - Habte Tadesse Likassa, Wen-Hsien Fang:
Robust Regression for Image Alignment via Subspace Recovery Techniques. 288-293 - Ming-Chia Kuo, Pangfeng Liu, Jan-Jan Wu:
An Efficient Dynamic Load-Balancing Large Scale Graph-Processing System. 294-298 - Zhengping Zhang, Carey Williamson:
A Campus-Level View of Outlook Email Traffic. 299-306 - Jinghua Yu, Qing Wang, Hong Chen:
Application of Kinect-based Motion Recognition Algorithm in Cultural Tourism. 307-311 - Jay Tzu-Chieh Lee, Shuo-Fang Liu:
Using QFD Method to Integrate Artworks and Product A Case Study of Tea Set. 312-317
Traffic Safety and Assessment
- Chih-Chung Chiu, Kuo-Sui Lin:
A New Design Review Method for Functional Safety of Automotive Electrical Systems. 318-326 - Hyu-Seop Song, Yongbeom Lee, Seongkeun Park, Hyeonseok Kim, Eungi Cho, Mingyu Park, Seung-Woo Kim:
A Study on Classification of Traffic Accident Injury Grade Using CNN and NASS-CDS Data. 327-331 - Chin-Kit Ng, Soon-Nyean Cheong, Yee-Loo Foo:
Lightweight Deep Neural Network Approach for Parking Violation Detection. 332-337
Industrial Automation and Control Technology
- Chi-Heng Lu, Jhih-Jhong Jhuang, Chiu-Ching Tuan:
Application of Insole Pressure Sensor to Assess Lower Extremity Compliance. 338-342 - Shaopeng Wang, Shulin Yang, Hongwei Cai:
Application Research of Workflow Technology in Printing and Publishing Industry. 343-346 - Jay Tzu-Chieh Lee, Shuo-Fang Liu:
Using 3D Carbon Dioxide Slab Laser Printing Processing for Craft Teaching in Elementary School. 347-351 - Nantiwat Pholdee, Sujin Bureerat:
Multiobjective Trajectory Planning of a 6D Robot based on Multiobjective Meta Heuristic Search. 352-356 - Mandana Ewert:
A Random Number Generator Based on Electronic Noise and the Xorshift Algorithm. 357-362
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.