Default Cover Image

2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)

to Matsue, Japan

Matsue, Japan

ISBN: 978-1-5090-1093-6

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-ix
PrefaceFreely available from IEEE.pp. x-x
Conference OrganizationFreely available from IEEE.pp. xi-xi
Program CommitteeFreely available from IEEE.pp. xii-xii
ReviewersFreely available from IEEE.pp. xiii-xiii
Energy-Efficient Activity Recognition on SmartphoneFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Active Magnetic Bearing System Using PID-surface Sliding Mode ControlFull-text access may be available. Sign in or learn about subscription options.pp. 5-8
Optimal Design of LED Street Lighting with Road ConditionsFull-text access may be available. Sign in or learn about subscription options.pp. 9-11
IoT-type Electric Fan: Remote-Controlled by Smart-PhoneFull-text access may be available. Sign in or learn about subscription options.pp. 12-15
A Genetic Rough Set Approach to Fuzzy Time-Series PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 20-23
Incremental Updates of Rough Set-Based Probabilistic RulesFull-text access may be available. Sign in or learn about subscription options.pp. 28-31
Safety Live Environment Enhancement for Older Adult by Using the Behavior Prediction ModelFull-text access may be available. Sign in or learn about subscription options.pp. 36-39
A Networked Multimedia Distributed Kiosk System for Commercial and Home AppliancesFull-text access may be available. Sign in or learn about subscription options.pp. 40-43
A Flexible and Wearable EEG DeviceFull-text access may be available. Sign in or learn about subscription options.pp. 48-51
Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 56-59
Reversible Data Hiding in Pairwisely Encrypted ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 60-63
A Compact Flower Pollination Algorithm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 76-79
Speech Recognition in a Multi-speaker Environment by Using Hidden Markov Model and Mel-frequency ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 80-83
A New Method for Identifying Users Interest for Personalized RecommendationsFull-text access may be available. Sign in or learn about subscription options.pp. 84-87
Kernel Self-Adaptive Learning-Based Satellite Telemetry Data ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 88-91
A Novel Harmonic Field Based Method for Femoral Head Segmentation from Challenging CT DataFull-text access may be available. Sign in or learn about subscription options.pp. 92-95
Implementation of the Human Action State Recognition Using SmartphoneFull-text access may be available. Sign in or learn about subscription options.pp. 96-99
Design of a Sun Tracking System Based on the Brightest Point in Sky ImageFull-text access may be available. Sign in or learn about subscription options.pp. 100-103
A Virtual Wall for Perception-Assist with a Lower-Limb Power-Assist RobotFull-text access may be available. Sign in or learn about subscription options.pp. 104-109
Pick-Up Motion Based on Vision and Tactile Information in Hand/Arm RobotFull-text access may be available. Sign in or learn about subscription options.pp. 110-113
Action Recognition System with the Microsoft KinectV2 Using a Hidden Markov ModelFull-text access may be available. Sign in or learn about subscription options.pp. 118-121
A General Video Surveillance Framework for Animal Behavior AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 130-133
A Decision Tree Based Method for Extracting Important Elements of In-Applications PurchaseFull-text access may be available. Sign in or learn about subscription options.pp. 138-141
A Secure Condition-Based Location Authentication Protocol for Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 146-149
Low Space Complexity Multiplier for Even-Type Gaussian Normal Basis over GF(2m)Full-text access may be available. Sign in or learn about subscription options.pp. 150-153
Construct Asterisk 16QAM Constellation Extension Scheme for PAPR Reduction in SC-FDMA SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 154-157
The Visual Interactive Programing Learning System Using Image ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 158-161
Estrus Detection for Dairy Cow Using a Laser Range SensorFull-text access may be available. Sign in or learn about subscription options.pp. 162-165
Time Competition Flooding in High-Density Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 170-173
A Dynamic Distributed Energy Management Algorithm of Home Sensor Network for Home Automation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 174-177
An Algorithm for Improving Network Throughput of Wireless Distribution SystemFull-text access may be available. Sign in or learn about subscription options.pp. 178-181
Numerical Evaluation of Two Management Schemes for Sharing Limited BandwidthFull-text access may be available. Sign in or learn about subscription options.pp. 182-185
A Real-Time Routing Algorithm for End-to-End Communication Networks with QoS RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 186-189
Author indexFreely available from IEEE.pp. 190-191
[Publisher's information]Freely available from IEEE.pp. 192-192
Showing 57 out of 57