Default Cover Image

2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)

Nov. 4 2019 to Nov. 6 2019

Kathmandu, Nepal

ISBN: 978-4-907626-41-9

Table of Contents

[Copyright notice]Freely available from IEEE.pp. 1-1
CommitteesFreely available from IEEE.pp. 1-2
ProgramFreely available from IEEE.pp. 1-6
An End-to-End BLE Indoor Location Estimation Method Using LSTMFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
PBEM: A Pattern-Based Embedding Model for User Location Category PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Improving Accuracy of Localization with Portable APs in Ultra-Narrow-Band-based LPWA NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Traffic-Demand-Aware Collision-free Channel Allocation for Multi-channel Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Layer 2 Packet Authentication for IoT Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Recording Daily Health Status with Chatbot on Mobile Phone - A Preliminary StudyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Low-Power WSN System for Honey Bee MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Throughput Modeling and Analysis under Power Control in High Efficiency Wireless LANFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Number of TCP Connections to Saturate Bandwidth of Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Cloud-based Dynamic Tiled Display Adapting to Grouping by Distinction of Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
MapReduce Processing with 5G networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Maneuver Classification in Wheelchair Basketball Using Inertial SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Data Correction Management Method Using Temporal Data in Fog ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A Smartphone Application that Automatically Provides Arrival Time based on Estimation of Train on BoardFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
An Access Control Mechanism for Pre-trained ML Models in Mobile AppsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Transmission Reduction Scheme in an Emergency Warning System with LTE D2DFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Human Tracking of Single Laser Range Finder Using Features Extracted by Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Characterizing Mobile Web Traffic: A Case Study of an Academic Web ServerFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A PDR Smartphone Application Considering Side/Backward StepsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Shopping Refugees Support Robot with SNS Agency FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Preliminary Investigation of Visualizing Human Activity Recognition Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Reducing Waiting Time at an Intersection with Autnomous and Non-autonomous VehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Showing 38 out of 38