Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FICLOUDW
FICLOUDW 2018
Generate Citations
2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
Aug. 6 2018 to Aug. 8 2018
Barcelona, Spain
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of contents
Freely available from IEEE.
pp. 5-10
Message from the FiCloud 2018 Workshops Coordinators
Freely available from IEEE.
pp. 11-11
FiCloud 2018 Workshops Organizing Committees
Freely available from IEEE.
pp. 12-18
User Interface Design Method Considering UI Device in Internet of Things System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Shohei Toyama
,
Masayuki Hirayama
Cybersecurity In Microgrids
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Sebastian Cruz-Duarte
,
Paulo A. Gaona-Garcia
,
Elvis E. Gaona-Garcia
Deep Learning and Data Mining Classification through the Intelligent Agent Reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-20
by
Amine Chemchem
,
François Alin
,
Michael Krajecki
Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-27
by
Yen-Wen Chen
,
Yu-Hsuan Lin
A Markov Chain Based Link Lifetime Prediction in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-33
by
Sayed Chhattan Shah
,
Sunil Kumar
Autonomous Data Acquisition in the Hierarchical Edge-Based MCS Ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-41
by
Martina Marjanović
,
Aleksandar Antonić
,
Ivana Podnar Žarko
IEEE 802.15.4 Thread Mesh Network – Data Transmission in Harsh Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Wojciech Rzepecki
,
Łukasz Iwanecki
,
Piotr Ryba
Metrics and Tool for Evaluating Data Stream Processing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-55
by
Andre Leon Sampaio Gradvohl
Standardization of Ensuring Information Security for Big Data Technologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-63
by
Natalia Miloslavskaya
,
Andrey Nikiforov
,
Vladimir Budzko
Adaptive Control of Apache Spark's Data Caching Mechanism Based on Workload Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-69
by
Hideo Inagaki
,
Tomoyuki Fujii
,
Ryota Kawashima
,
Hiroshi Matsuo
Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-77
by
Kirill Plaksiy
,
Andrey Nikiforov
,
Natalia Miloslavskaya
A Proxy-Based Query Aggregation Method for Distributed Key-Value Stores
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-83
by
Daichi Kawanami
,
Masanari Kamoshita
,
Ryota Kawashima
,
Hiroshi Matsuo
Predictive Repair and Support of Engineering Systems Based on Distributed Data Processing Model within an IoT Concept
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-89
by
Vasiliy S. Kireev
,
Stanislav A. Filippov
,
Anna I. Guseva
,
Pyotr V. Bochkaryov
,
Igor A. Kuznetsov
,
Vladimir Migalin
,
Sergey S. Filin
Cloud Computing in Housing and Utility Services Monitoring Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-94
by
Vasiliy S. Kireev
,
Stanislav A. Filippov
,
Anna I. Guseva
,
Pyotr V. Bochkaryov
,
Igor A. Kuznetsov
,
Vladimir Migalin
Computing Len for Exploring the Historical People's Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-101
by
Junjie Huang
,
Tiejian Luo
Comparative Evaluation of Cyber Migration Factors in the Current Social Media Landscape
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-107
by
Xiangyu Xiao
,
Nicholas Caporusso
Social Engineering: Application of Psychology to Information Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-114
by
Ivan Del Pozo
,
Mauricio Iturralde
,
Felipe Restrepo
User Trajectory Extraction Based on WiFi Scanning
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-120
by
Maroš Čavojský
,
Marek Uhlar
,
Marian Ivanis
,
Martin Molnar
,
Martin Drozda
Developing a Mobile Application and Six Sigma for Health Awareness Improvement regarding Diabetic Students in Kuwait
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-128
by
Suat Kasap
Embedded Fatigue Detection Using Convolutional Neural Networks with Mobile Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-133
by
Mohammed Ghazal
,
Yasmine Abu Haeyeh
,
Abdelrahman Abed
,
Sara Ghazal
Design and Implementation of a Mobile Device for Blood Glucose Level Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-139
by
Mohammed Ghazal
,
Marah Alhalabi
,
Mansour Chabnari
,
Linda Ghazal
,
Luay Fraiwan
Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Sara Alromaihi
,
Wael Elmedany
,
Chitra Balakrishna
Mobile Microscopic Device to Detect Parasitical Cell-Related Diseases Using Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Aishah Khan
,
Ashraf Khalil
,
Hassan Hajjdiab
A Food Wastage Reduction Mobile Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Hassan Hajjdiab
,
Ayesha Anzer
,
Hadeel A. Tabaza
,
Wedad Ahmed
Real Time Adaptive Approach for Image Processing Using Mobile Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-163
by
Ahmed Darweesh
,
Ahmed Abouelfarag
,
Rania Kadry
A Mobile Data Transfer in Energy-Efficient Intelligent Systems for Wastewater Treatment of Thermal Power Plants
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Samal Abdreshova
,
Tatyana Golubeva
,
Sergey Konshin
,
Shabden Bahtaev
,
Birlesbek Aliyarov
,
Viktor Tailakov
Proposal of Analysis and Evaluation Method of Urban Area Space Utilizing of Wheelchair Probe Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-175
by
Yuriko Oda
,
Fumihito Ito
,
Ory Yoshifuji
,
Youichi Oda
,
Setsuko Kanai
,
Zong Shichun
,
Hirotomo Ohuchi
Web Intelligence in Higher Education: A Study on the Usage of Business Intelligence Techniques in Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-181
by
Adriano Maia
,
Filipe Portela
,
Manuel Filipe Santos
Towards a Fast Off-Line Static Malware Analysis Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-187
by
Macdonald Chikapa
,
Anitta Patience Namanya
Understanding Awareness of Cyber Security Threat among IT Employees
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-192
by
Hamad Al-Mohannadi
,
Irfan Awan
,
Jassim Al Hamar
,
Yousef Al Hamar
,
Mohammad Shah
,
Ahmad Musa
Biometric of Intent: A New Approach Identifying Potential Threat in Highly Secured Facilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-197
by
Joelle Chamieh
,
Jassim Al Hamar
,
Hamad Al-Mohannadi
,
Mariam Al Hamar
,
Ahmad Al-Mutlaq
,
Ahmad Musa
Malware Propagation Modelling in Peer-to-Peer Networks: A Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-202
by
Ahmad Musa
,
Hamad Almohannadi
,
Jassim Alhamar
Gamification’s Impact on Employee Engagement: Enhancing Employee Well-Being with a Cloud Based Gamified Team-Building Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-208
by
Balázs Barna
,
Szabina Fodor
Battling the Fear of Public Speaking: Designing Software as a Service Solution for a Virtual Reality Therapy
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-213
by
Justas Salkevicius
,
Lukas Navickas
On the Understanding of Gamification in Blockchain Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-219
by
Reza M. Parizi
,
Ali Dehghantanha
A Cloud-Based Service for Gamification of eGuides
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-224
by
Jakub Swacha
,
Artur Kulpa
Energy-Efficient Algorithm for Load Balancing and VMs Reassignment in Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-230
by
Nabila Djennane
,
Rachida Aoudjit
,
Samia Bouzefrane
Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-236
by
Christian Franck
,
Johann Großschädl
,
Yann Le Corre
,
Cyrille Lenou Tago
Energy-Efficient Hardware Caching Decision Using Fuzzy Logic in Mobile Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-242
by
Sarra Mehamel
,
Khaled Slimani
,
Samia Bouzefrane
,
Mehammed Daoui
A Down-to-Earth Integration of Named Data Networking in the Real-World IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-249
by
Amar Abane
,
Paul Muhlethaler
,
Mehammed Daoui
,
Hossam Afifi
Author index
Freely available from IEEE.
pp. 251-252
[Publisher's information]
Freely available from IEEE.
pp. 254-254
Showing 48 out of 48