buchspektrum Internet-Buchhandlung

Neuerscheinungen 2016

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

Han-Chieh Chao, Yi Pan, James J. (Jong Hyuk) Park, Gangman Yi (Beteiligte)

Ubiquitous Computing Application and Wireless Sensor


UCAWSN-14
Herausgegeben von Park, James J. (Jong Hyuk); Pan, Yi; Chao, Han-Chieh; Yi, Gangman
Softcover reprint of the original 1st ed. 2015. 2016. xviii, 742 S. 281 SW-Abb. 235 mm
Verlag/Jahr: SPRINGER NETHERLANDS; SPRINGER 2016
ISBN: 9402403752 (9402403752)
Neue ISBN: 978-9402403756 (9789402403756)

Preis und Lieferzeit: Bitte klicken


IT changes everyday´s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its special tracks.
Voronoi Diagram and Microstructure of Weldment; J. Cho, M. Choi.

High-SNR Approximate Closed-Form Formulas for the Average Error Probability of M-ary Modulation Schemes over Nakagami-q Fading Channels; H. Lee.

Performance Evaluation of IEEE 802.15.6 MAC with User Priorities for Medical Applications; L.Yang, et al.

Using Dead Reckoning, GPS and Fingerprinting for Ubiquitous Positioning; H.-H. Chiu, et al.

Multi-core Scheduling Scheme for Wireless Sensor Nodes with NVRAM-based hybrid memory; S. Oh, Y. Ryu.

Security Scheme for LTE Initial Attach; U. Jang, et al.

ASiPEC: An Application Specific Instruction-Set Processor for High Performance Entropy Coding; S.-H. Choi, et al.

An Enhanced Cooperative Spectrum Sensing Scheme based on New Rule of Combining Evidences in Cognitive Radio; M. Sajjad Khan, I.Koo.

A Design of an Intrusion-Tolerant System based on Effective Resource Conversion; S. Heo, et al.

An Adaptive Mobile Service Execution Framework in the Cloud Computing Environment; X. Yin, et al.

Trajectory Prediction for using real Data and real meteorological data; Y. Kim, et al.

The ADS-B Protection Method for Next-Generation Air Traffic Management System; S.-H. Lee, et al.

Interactive drawing Based on Hand Gesture; T.-E. Kim.

Nullifying Malicious Users for Cooperative Spectrum Sensing in Cognitive Radio Networks Using Outlier Detection Methods; P. Prasain, et al.

A Study on Electronic-Money Technology using Near Field Communication; M.-S. Jung.

A Novel Android Memory Management Policy Focused on Periodic Habits of a User; J. H. Kim, et al.

Care Record Summary Validation Tool with Social Network Service; J. W. Sin, et al.

Performance Study of an Adaptive Trickle Scheme for Wireless Sensor Networks; Y.-W. Lin, P.-H. Wang.

A New Distributed Grid Scheme utilizing Node-based Preprocessing Technique for Supporting k-NN Queries; H. Lee, et al.

A Cooperative GPS Approach for Improving Positioning Accuracy in a Location Based System; R. Islam, J. Kim.

Intelligent Evaluation Models based on Different Routing Protocols in Wireless Sensor Networks; N. Cao, et al.

Implementation of Personalized Wellness Service; M. Kim, et al.

SOM Clustering Method using user´s features to classify profitable customer for Recommender Service in u-Commerce; C. Y. Sung, et al.

A Performance Improvement Scheme for Discovery Service; P. Liu, et al.

A Cross Cloud Authorization Mechanism Using NFC and RBAC Technology; H.-S. Jan, et al.

A Study on High Security Authentication Mechanism for 3G/WLAN Networks; W.-C. Wu, H.-T. Liaw.

A Simple Authentication Scheme and Access Control Protocol for VANETs; W.-C.Wu, Y.-M. Chen.

Decision Tree Approach to Predict lung Cancer the Data Mining Technology; J.-H. Kao, et al.

Study of Customer Value and Supplier Dependence with the RFM Model; J.-H. Kao, et al.

An assistance mechanism bsed on active RFID and RSSI tracking technology for monitoring rehabilitation patients; C.-S. Wang, et al.

Feature Selection for Support Vector Machines base on Modified Artificial Fish Swarm Algorithm; K.-C. Lin, et al.

A new Remote Desktop Approach with Mobile Devices: Design and Implementation; T.-Y. Huang, et al.

Mitigating DoS Attacks based on Recovery-based ITS in Cloud; B. Jang, et al.

A Databases Strategy in Redundant Web Servers with Fault-Resilience for a Computing Grid; M.-h. Ok.

Implementation of Low Power LED Display Controller using Adiabatic Operation; K.-R. Lee, et al.

Hand Gesture Recognition using 8-Directional Vector Chains in Quantization Space; S. Lee, et al.

Forensic Artifacts in Network Surveillance Systems; K.-S. Lim et al.

Routing Protocol for Hierarchical Clustering Wireless Sensor Networks; A. Ali, et al.

The Design of a New Virtualization-based Server Cluster System Targeting for Ubiquitous IT Systems;
J. Lim, et al.

A Conceptualisation of a Strategy to Optimise Shiftwork Scheduling in an Emergency Departmen