Default Cover Image

2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)

Aug. 6 2018 to Aug. 8 2018

Barcelona, Spain

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of contentsFreely available from IEEE.pp. 5-10
Message from the FiCloud 2018 Workshops CoordinatorsFreely available from IEEE.pp. 11-11
FiCloud 2018 Workshops Organizing CommitteesFreely available from IEEE.pp. 12-18
User Interface Design Method Considering UI Device in Internet of Things SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Cybersecurity In MicrogridsFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Deep Learning and Data Mining Classification through the Intelligent Agent ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 13-20
Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDNFull-text access may be available. Sign in or learn about subscription options.pp. 21-27
A Markov Chain Based Link Lifetime Prediction in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 28-33
Autonomous Data Acquisition in the Hierarchical Edge-Based MCS EcosystemFull-text access may be available. Sign in or learn about subscription options.pp. 34-41
IEEE 802.15.4 Thread Mesh Network – Data Transmission in Harsh EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
Metrics and Tool for Evaluating Data Stream Processing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 48-55
Standardization of Ensuring Information Security for Big Data TechnologiesFull-text access may be available. Sign in or learn about subscription options.pp. 56-63
A Proxy-Based Query Aggregation Method for Distributed Key-Value StoresFull-text access may be available. Sign in or learn about subscription options.pp. 78-83
Computing Len for Exploring the Historical People's Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 95-101
Comparative Evaluation of Cyber Migration Factors in the Current Social Media LandscapeFull-text access may be available. Sign in or learn about subscription options.pp. 102-107
Social Engineering: Application of Psychology to Information SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 108-114
User Trajectory Extraction Based on WiFi ScanningFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Developing a Mobile Application and Six Sigma for Health Awareness Improvement regarding Diabetic Students in KuwaitFull-text access may be available. Sign in or learn about subscription options.pp. 121-128
Embedded Fatigue Detection Using Convolutional Neural Networks with Mobile IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 129-133
Design and Implementation of a Mobile Device for Blood Glucose Level AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 134-139
Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 140-145
Mobile Microscopic Device to Detect Parasitical Cell-Related Diseases Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
A Food Wastage Reduction Mobile ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 152-157
Real Time Adaptive Approach for Image Processing Using Mobile NodesFull-text access may be available. Sign in or learn about subscription options.pp. 158-163
Towards a Fast Off-Line Static Malware Analysis FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 182-187
Understanding Awareness of Cyber Security Threat among IT EmployeesFull-text access may be available. Sign in or learn about subscription options.pp. 188-192
Malware Propagation Modelling in Peer-to-Peer Networks: A ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 198-202
Battling the Fear of Public Speaking: Designing Software as a Service Solution for a Virtual Reality TherapyFull-text access may be available. Sign in or learn about subscription options.pp. 209-213
On the Understanding of Gamification in Blockchain SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 214-219
A Cloud-Based Service for Gamification of eGuidesFull-text access may be available. Sign in or learn about subscription options.pp. 220-224
Energy-Efficient Algorithm for Load Balancing and VMs Reassignment in Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 225-230
Energy-Efficient Hardware Caching Decision Using Fuzzy Logic in Mobile Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
A Down-to-Earth Integration of Named Data Networking in the Real-World IoTFull-text access may be available. Sign in or learn about subscription options.pp. 243-249
Author indexFreely available from IEEE.pp. 251-252
[Publisher's information]Freely available from IEEE.pp. 254-254
Showing 48 out of 48