Default Cover Image

2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

July 11 2014 to July 13 2014

Hefei, China

Table of Contents

A novel approach to urban flood monitoring using computer visionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Location based protocols in Wireless Sensor Network — A reviewFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Cloud computing and its security issues — A reviewFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Wireless sensor networks: Routing protocols and security issuesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Study of virtual billing based communication network performance assessment systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Detection of dishonest trust recommendations in mobile ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Parameters optimization in blind motion deblurring of UAV imagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
The design of smart home control systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Chinese microblogging emotion classification based on support vector machineFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Sina microblog big data grabbing and analysis based on Multi-strategy modelFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
New adaptations of classic algorithm for mining frequent itemsets from uncertain dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A secure and robust crypto system based on unique dynamic key generation schemeFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Foot plant detection for motion capture data by curve saliencyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Studies of improving the performance of A/D conversion by post band-pass filtering methodFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
The secret image sharing scheme based on improved LSB algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Virtual merging of fractured fragments based on constraint clusterFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A heterogeneous network access control algorithm based on DS evidence theoryFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Learning a discriminative dictionary for locality constrained coding and sparse representationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Load distribution for multi-way streams joins using clusterFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Chinese Facial Expression Database with spontaneous expressions across multiple posesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Characteristics of narrow band dual-polarized MIMO over satellite channel modelFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Test wrapper optimization technique using BDF and GA for 3D IP coresFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Depth map-based human activity tracking and recognition using body joints features and Self-Organized MapFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Ridge body parts features for human pose estimation and recognition from RGB-D video dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Design of area and power efficient complex number multiplierFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Rateless codes based file delivery protocols in deep space communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An adroit naïve Bayesian based sequence mining approach for prediction of MRI brain tumor imageFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A low power BIST scheme based on block encodingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Enhancement of prediction accuracy in COCOMO model for software project using neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
GSM based remote device controller using SIM548CFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Service composition and user modeling for personalized recommendation in cloud computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A hybrid topology based multicast routing for cognitive radio ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An Active Channel Changing Delay method to improve IPTV channel availabilityFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Integrated location fingerprinting and physical neighborhood for WLAN probabilistic localizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Real time implementation of Elliptic Curve Cryptography over a open source VoIP serverFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
To achieve maximal throughputs in CSMA wireless networks through offered-load controlFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Wireless network architecture using sound for ubiquitous signal transmissionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Connected Component-Based Distributed method for overlapping community detectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
An indoor positioning algorithm using joint information entropy based on WLAN fingerprintFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Clustering process for maximizing lifetime using probabilistic logic in WSNFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Speech enhancement to overcome the effect of near-end noise in mobile phones using psychoacousticsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technologyFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A test data compression scheme based on position information codingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Study of cryptography-based cyberspace data securityFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
An automatic generation method of Hui-style architectures based on 2D planar graphFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Multi-layer multi-center atom set cohesion clustering algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
On minimum covering of invertible honeycomb meshesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Differential evolution with M-fitness methodFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Development of a wireless sensor network for detecting fire and Gas leaks in a collapsing buildingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Simple GSM base station based on universal software radio peripheralFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Runtime reconfiguration of wireless sensor node using FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An introduction to Markov logic networks and application in video activity analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Survey on scheduling in hybrid cloudsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Mobility management analysisy in LTE-A heterogeneous networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Utilizing neighbor information in image segmentationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Securing cloud infrastructure through PKIFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
SDN based uniform network architecture for future wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An interference mitigation scheme for IEEE 802.15.4 networks under IEEE 802.11b/g interferenceFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A hybrid RSSI based localization algorithm for WSN using a mobile anchor nodeFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Extending self-organizing network availability using genetic algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Non blind watermarking technique using enhanced one time pad in DWT domainFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A high performance 2.4 GHz GaAs HBT class J power amplifierFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Performance analysis of MIMO two-way relay channelFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Research on vertical handover in LTE two-tier Macrocell/Femtocell Systems based on fuzzy neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Personalized recommendation based on link prediction in dynamic super-networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Fish school search approach to find optimized thresholds in gray-scale imageFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
New blind signcryption schemes with application to E-cash systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A heuristic overlay multicast routing algorithm for minimum delay optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Pedestrian detection using two-stage sparse coding algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Study and application on power communication operation mode checking and analysis methodFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Compact planar G-shape UWB antenna with notch characteristics for satellite communicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
CGF-LQ: An optimal Combined Greedy-Face routing based on local link qualityFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Low complexity MMSE estimator for OFDM systems over slow fading Rayleigh channelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
The development of a visualization framework for fishing vessels at seaFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Modified fuzzy hyperline-segment neural network for classification with mixed attribuesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Mining classification rules from fuzzy min-max neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Transmitting hidden information using steganography via FacebookFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Towards the formal foundation of orchestration processFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Routing mechanism in active Peer-to-Peer networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Design of a compact ultra wide band microstrip patch antennaFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
The coverage problem in UAV network: A surveyFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Selfish node detection and its behavior in WSNFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A 200Mbps random number generator with jitter-amplified oscillatorFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Showing 100 out of 170