default search action
CITS 2019: Beijing, China
- Mohammad S. Obaidat, Zhenqiang Mi, Kuei-Fang Hsiao, Petros Nicopolitidis, Daniel Cascado Caballero:
2019 International Conference on Computer, Information and Telecommunication Systems, CITS 2019, Beijing, China, August 28-31, 2019. IEEE 2019, ISBN 978-1-7281-1374-6 - Biwei Li, Yu Guo, Zhenqiang Mi, Yang Yang, Mohammad S. Obaidat:
A Novel Data Compression Technique Incorporated with Computer Offloading in RGB-D SLAM. 1-5 - Umesh Bodkhe, Pronaya Bhattacharya, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Mohammad S. Obaidat:
BloHosT: Blockchain Enabled Smart Tourism and Hospitality Management. 1-5 - Roger Achkar, Khodor Ghayad, Rayan Haidar, Sawsan Saleh, Rana Al Hajj:
Medical Handwritten Prescription Recognition Using CRNN. 1-5 - Shaojie Liu, Ning Wang, Xiaoting Wang:
Multi-factor Influenced Integrated Driving Behavior Clustering Analysis Evaluation Model. 1-5 - Huimin Zhang, Fanrong Sun, Jingjing Qian:
An Optimization Based on General Airport of Complex Condition. 1-5 - Xin Yuan, Weite Li, Kui Lin, Jinglu Hu:
A Deep Neural Network Based Hierarchical Multi-Label Classifier for Protein Function Prediction. 1-5 - Daya Sagar Gupta, SK Hafizul Islam, Mohammad S. Obaidat:
A Secure Identity-based Deniable Authentication Protocol for MANETs. 1-5 - Mochammad Arief Hermawan Sutoyo, Hendri Priyambowo, Afifah Nurzahra, Dana Indra Sensuse, Shidiq Al Hakim, Deki Satria:
Knowledge Management System Design using Gamification: A Case study of the e-Government Laboratory, Universitas Indonesia. 1-5 - Dimitrios G. Giatzitzoglou, Dionisios N. Sotiropoulos, George A. Tsihrintzis:
AIRS-x: An eXtension to the Original Artificial Immune Recognition Learning Algorithm. 1-5 - Qian Xu, Zhanqi Xu, Tao Ma:
A Short Survey and Challenges for Multiobjective Evolutionary Algorithms Based on Decomposition. 1-5 - Zhoudan Lv, Feng He, Lin Chen:
Finding Persistent Items using Invertible Bloom Lookup Table. 1-5 - Hong-Xia Wang, Shao-Jie Wen:
Review on Development of Software and Information Services Industry in Beijing. 1-5 - Li Liu, Taiyu Luo, Yuanyuan Du:
A new task scheduling strategy based on improved ant colony algorithm in IaaS layer. 1-5 - Segundo Moises Toapanta Toapanta, Christopher Eduardo Solís Salazar, Daniel Humberto Plua Moran, Luis Enrique Mafla Gallegos, Ma. del Roció Maciel Arellano:
Analysis of Appropriate Security Processes to Mitigate Risk in a Popular Election System. 1-5 - Zhen Wang, Kai Li, Yan Hu, Akira Fukuda, Weiqiang Kong:
Multilevel Permission Extraction in Android Applications for Malware Detection. 1-5 - Segundo Moises Toapanta Toapanta, Luis Antonio Palomino Romero, Felix Gustavo Mendoza Quimi, Maximo Geovani Tandazo Espinoza, Luis Enrique Mafla Gallegos:
Model of Shared Secret Applied to a Voting System for the National Electoral Council of Ecuador. 1-5 - Spyros Papadimitriou, Konstantina Chrysafiadi, Maria Virvou:
Evaluating the use of fuzzy logic in an educational game for offering adaptation. 1-5 - Mingyuan Lin, Rundi Zhou, Qing Yan, Xin Xu:
Automatic Pavement Crack Detection Using HMRF-EM Algorithm. 1-5 - Amanzhol Daribay, Mohammad S. Obaidat, Parimala Venkata Krishna:
Analysis of Authentication System Based on Keystroke Dynamics. 1-6 - JiaYing Guo, Yu Lu, Qian Xie, Qichao Guo:
Performance Evaluation of Fingerprint Recognition Modules on Mobile Device Based on Rule of Three. 1-4 - Khoa T. D. Nguyen, Changcheng Huang:
An Intelligent Parallel Algorithm for Online Virtual Network Embedding. 1-5 - Pravallika Dhulipalla, Minju Kang, Taejin Kim, Nathaniel Tan, Siddhartan Govindasamy, Michael B. Rahaim:
An Integrated Visible-Light and Radio Frequency Communications System. 1-6 - W. U. Huayi, B. A. I. Baohua:
A Secure Protocol in MAC Layer of Cognitive Radio Networks. 1-4 - Tong Zhou, Yu Guo, Yang Yang, Zhenqiang Mi, Mohammad S. Obaidat:
The School District Reorganization by Combining with Traffic Congestion Data. 1-5 - Salma Zainab Farooq, Dongkai Yang, Echoda Ngbede Joshua Ada:
Performance Analysis of Hatch Filtering for Cycle Slips Detection in Single Frequency RTK Positioning. 1-5 - Tian-Bo Deng:
Simplified Structure for Parameterizing Lp-Norm-Minimized Variable Filters. 1-4 - Wenlu Fan, Yang Wu, Shaohua Ju, Kun Zhang, Weiwei Yang:
Secure UAV Communication with Robust Communication and Trajectory Design. 1-5 - Georgios L. Stavrinides, Helen D. Karatza:
Scheduling Different Types of Gang Jobs in Distributed Systems. 1-5 - Li Tan, Minji Wang, Haoyu Wang, Li Liu:
Improved LEACH-M Protocol for Aerial Sensor Networks. 1-4 - Vanja Catic Kuko, Denis Music, Zanin Vejzovic, Jasmin Azemovic:
Model of foresight work habits of agile software team members by personality traits. 1-5 - Hongyi Liu, Xuan Hao, Jingang Liu:
Multi-level Reliable Security Mechanism Based on SpaceOS. 1-5 - Junying Wu, Yunfeng Peng, Meng Song, Manman Cui, Liang Zhang:
Link Congestion Prediction using Machine Learning for Software-Defined-Network Data Plane. 1-5 - Juxiang Chen, Zhihao Zhang, Liansheng Yao, Bo Li, Tong Chen:
Face Recognition Using Depth Images Base Convolutional Neural Network. 1-4 - Lili Xu, Xiuling He, Jing Zhang, Yangyang Li:
Automatic Classification of Discourse in Chinese Classroom Based on Multi-feature Fusion. 1-5 - Segundo Moises Toapanta Toapanta, Francisco Xavier Castro De La Rosa, Eduardo Michael Navarrete Fernandez, Fabrizio Darío Triviño Triviño, Luis Enrique Mafla Gallegos:
Prototype to Optimize the Management of Information Security Used by Internal Users in a Public Organization of Ecuador. 1-5 - Kanwal Wahab, Usman Qamar, Khawaja Sarmad Arif, Usman Ali:
Building a Biomedical Ontology for Chronic Liver Disease. 1-5 - Jhan S. Alarifi, John Fry, Darren Dancey, Moi Hoon Yap:
Understanding Face Age Estimation: humans and machine. 1-5 - Ziyi Zhuang, Shengming Jiang, Yanli Xu, Xiang Luo, Xin Cheng:
A Physical Layer Key Generation Scheme Based on Full-duplex Mode in Wireless Networks without Fixed Infrastructure. 1-5 - Fedor I. Ivanov, Pavel Sergeevich Rybin:
On the Asymptotic Capacity of Slotted Multiple Access Channel. 1-5 - Huilin Zhu, Jinglu Hu:
Air Quality Forecasting Using SVR with Quasi-Linear Kernel. 1-5 - Chunmeng Weng, Jinzhu Cao, Feiyun Zhu:
Research on Technology Empowerment in Digital Transformation of Library in Information Age. 1-5 - Wensha Huang, Lina Wang:
A Hash Function based on Sponge Structure with Chaotic Map for Spinal Codes. 1-5 - Zhiqiang Gu, Ryuichi Takahashi, Yoshiaki Fukazawa:
Real-time Resources Allocation Framework for Multi-Task Offloading in Mobile Cloud Computing. 1-5 - Xinmiao Yan, Jiemin Zhou, Fanrong Sun:
Optimization of Flue Gas Uplift Model Based on Eddy-dissipation Rate of Flight Turbulence. 1-5 - Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Mohammad S. Obaidat, Balqies Sadoun:
HaBiTs: Blockchain-based Telesurgery Framework for Healthcare 4.0. 1-5 - Nanxing Li, Yiqiang Sheng, Hong Ni:
CoNN: Collaborative Neural Network for Personalized Representation Learning with Application to Scalable Task Classification. 1-5 - Guiqin Yang, Xing Chang, Zhanjun Jiang:
A Fast Aerial Images Mosaic Method Based on ORB Feature and Homography Matrix. 1-5 - Huilan Quan, Ryuichi Takahashi, Yoshiaki Fukazawa:
Dynamic Service Selection based on User Feedback in the IoT Environment. 1-5 - Yamin Li, Wanming Chu:
Switch Fault Tolerance in a Mirrored K-Ary N-Tree. 1-5 - Chuanhui Ma, Mengwei Yang, Yi Jin, Kang Wu, Jun Yan:
A New Indoor Localization Algorithm Using Received Signal Strength Indicator Measurements and Statistical Feature of the Channel State Information. 1-5 - Hao Luo, Dazhuan Xu, Yue Chen, Shengkai Xu:
Range Information and Amplitude-phase Information for Multi-carrier Radar Systems. 1-5 - Gregor Klancar, Gasper Music, Hao Chen, Marija Seder:
Wheeled robot navigation based on a unimodal potential function. 1-5 - Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao:
An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm. 1-5 - Wei Liu, Chang Xu, Zhao Tian, Dong-Kun Li, Guan-Zhong Lu, Wei She:
Research on Gateway Deployment for Throughput Optimization in Wireless Mesh Networks. 1-5 - Menaka Pushpa Arthur:
Detecting Signal Spoofing and Jamming Attacks in UAV Networks using a Lightweight IDS. 1-5 - Rahim Umar, Fengfan Yang, Shoaib Mughal:
Network polar coded-cooperative SC-FDMA system. 1-5 - Jorge Luís Gregório, Hilda Carvalho de Oliveira, Lukas Riehl Figueiredo, Simone G. D. Prado:
Specification of software requirements with support of business process ontologies. 1-5 - Yuanyuan Zhou, Wenlong Chen, Rong Xiao, Chengan Zhao, Tianzhu Shao:
Lightweight Two-dimensional Routing Mechanism Based on Agent Calculation. 1-5 - Fang Liu, Jun Yan:
Optimal Power Allocation Strategy for Multi-target Wireless Wideband Localization System via Genetic Algorithm. 1-4 - Chengzhi Jiang, Xiaoming Fan, Yan Xing, Chao Duan, Jiaqi Zhang:
Min Norm Failure Vector Guided Yield Optimization Method for Nanometer SRAM Design. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.