Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICOIN
ICOIN 2018
Generate Citations
2018 International Conference on Information Networking (ICOIN)
Jan. 10 2018 to Jan. 12 2018
Chiang Mai, Thailand
Table of Contents
[Copyright notice]
Freely available from IEEE.
pp. 2-2
Organizing committee members
Freely available from IEEE.
pp. 4-9
Table of contents
Freely available from IEEE.
pp. 3-3
Conference room map
Freely available from IEEE.
pp. 25-32
[Front matter]
Freely available from IEEE.
pp. 1-32
A Jaccard base similarity measure to improve performance of CF based recommender systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mubbashir Ayub
,
Mustansar Ali Ghazanfar
,
Muazzam Maqsood
,
Asjad Saleem
Document level polarity classification with attention gated recurrent unit
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Hoon-Keng Poon
,
Wun-She Yap
,
Yee-Kai Tee
,
Bok-Min Goi
,
Wai-Kong Lee
Improved UGRNN for short-term traffic flow prediction with multi-feature sequence inputs
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-17
by
Jiabin Qu
,
Xinyu Gu
,
Lin Zhang
Multi-finger motion inference using M1 neural decoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-20
by
Hwayoung Choi
,
Kyung-Jin You
,
Hyun-chool Shin
Proactive detection of algorithmically generated malicious domains
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-24
by
Jeffrey Spaulding
,
Jeman Park
,
Joongheon Kim
,
Aziz Mohaisen
A comparative study of failover schemes for IaaS recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-30
by
Wasiq Noor Ahmad Qasmi
,
Taimur Siddiqui
,
Muhammad Karam Shehzad
,
Adnan Iqbal
,
Muhammad Saqib Ilyas
Secured outsourcing towards a cloud computing environment based on DNA cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Hamza Hammami
,
Hanen Brahmi
,
Sadok Ben Yahia
Towards a new security approach based on heartbeat authentication to ensure security of cloud data access
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-43
by
Hamza Hammami
,
Hanen Brahmi
,
Sadok Ben Yahia
Unified logging system for monitoring multiple cloud storage providers in cloud storage broker
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-49
by
Muhammad I.H. Sukmana
,
Kennedy A. Torkura
,
Feng Cheng
,
Christoph Meinel
,
Hendrik Graupner
PRESENCE: Toward a novel approach for performance evaluation of mobile cloud SaaS Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-55
by
Abdallah A. Z. A. Ibrahim
,
Sebastien Varrette
,
Pascal Bouvry
Downlink sum-rate optimization leveraging hungarian method in fog radio access networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-60
by
Duc-Nghia Vu
,
Nhu-Ngoc Dao
,
Sungrae Cho
User scenario based video contents creation system
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-63
by
Minho Han
,
Sun-Joong Kim
A transformation analysis of 3D virtual object for projection mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-66
by
Sanghoon Lee
,
Ilhong Shin
,
Eunjun Rhee
,
Sunghee Lee
,
Namkyung Lee
A study on trust factors in a multimedia service environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-69
by
Seunghyeon Moon
,
Sungkwan Jung
,
Seungyong Jung
A study on near-real-time geometric correction system of drones image
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-72
by
Choi Myung Jin
,
Kim Tae Young
,
Lee Min Seob
,
Kim Min Jae
Trustworthiness management in sharing CDN infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-75
by
Tai-Won Um
,
Gyu Myoung Lee
,
Hyun-Woo Lee
A study on smart IoT hub for intelligent signage services using trust information
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-79
by
Jun Wook Lee
,
Yong Woo Kim
History-enhanced focused website segment crawler
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Tanaphol Suebchua
,
Bundit Manaskasemsak
,
Arnon Rungsawang
,
Hayato Yamana
Individualized electric power management system using BLE tag at a shared house
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-91
by
Hideki Kondo
,
Kazumasa Takami
DTNDocs: A delay tolerant peer-to-peer collaborative editing system
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-97
by
Charles Edward A. Robin
,
Victor M. Romero
Number ofpeople grasp system of neighboring terminals using Bluetooth low energy
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-103
by
Kazuki Uemura
,
Hiroki Murotsu
,
Koki Matsumoto
,
Shingo Nakajima
,
Tomotaka Wada
,
Kazuhiro Ohtsuki
On similarities of string and query sequence for DGA botnet detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-109
by
Chun-De Chang
,
Hui-Tang Lin
Fireplug: Flexible and robust N-version geo-replication of graph databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-115
by
Ray Neiheiser
,
Daniel Presser
,
Luciana Rech
,
Manuel Bravo
,
Luís Rodrigues
,
Miguel Correia
REST web service composition: A survey of automation and techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-121
by
Krisada Sangsanit
,
Werasak Kurutach
,
Suronapee Phoomvuthisarn
Proposal of a personal agent for human centric information networking: Collaboration of human profile and human context
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Masafumi Katoh
,
Masahiko Murakami
,
Akiko Yamada
,
Masaaki Kawai
,
Motoyoshi Sekiya
,
Sumie Morita
,
Makoto Murakami
Analyzing darknet TCP traffic stability at different timescales
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-133
by
Napaphat Vichaidis
,
Hiroshi Tsunoda
,
Glenn Manfield Keeni
Wake-up schedule modification for shorter-delay intermittent wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-139
by
Shin Horie
,
Hiroaki Higaki
A study for improvement of throughput in high-density wireless networks using transmitting opportunity control
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Takahiro Kawasaki
,
Yumi Takaki
,
Tomio Kamada
,
Chikara Ohta
Depth perception prediction of 3D video QoE for future internet services
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-149
by
Gokce Nur Yilmaz
Quality control scheme based on VBR characteristics for improving QoE of UHD streaming service
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Minsu Kim
,
Kwangsue Chung
Strategic defense and attack in deception based network security
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Daniel Fraunholz
,
Hans Dieter Schotten
A new multi classifier system using entropy-based features in DDoS attack detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-167
by
Abigail Koay
,
Aaron Chen
,
Ian Welch
,
Winston K. G. Seah
Cryptanalysis and improvement of a mutual user authentication scheme for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-173
by
Trupil Limbasiya
,
Arijit Karati
Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-181
by
Hamza Hammami
,
Hanen Brahmi
,
Sadok Ben Yahia
A secure WebRTC/WoT-based health-care architecture enhanced with access control
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-187
by
Saad El Jaouhari
,
Ahmed Bouabdallah
,
Jean-Marie Bonnin
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-193
by
Gaurav Varshney
,
Sumant Bagade
,
Shreya Sinha
Bypassing DRM protection in e-book applications on Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-198
by
Sangmin Lee
,
Kuyju Kim
,
Jina Kang
,
Hyoungshick Kim
Analyzing information availability in ICN under link failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-204
by
Eline Rietberg
,
Lucia D'Acunto
,
Robert Kooij
,
Hans van den Berg
Virtual network embedding in multi-domain environments with energy efficiency concepts
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-210
by
Samuel M. A. Araújo
,
Fernanda S. H. de Souza
,
Geraldo R. Mateus
A DTN routing algorithm adopting the “Community” and “Centrality” parameters used in social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-216
by
Yusuke Igarashi
,
Toshiaki Miyazaki
System of econometric equations of the world market of natural gas
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
N. I. Didenko
,
D. F. Skripnuk
,
O.V. Mirolyubova
,
Viktor Merkulov
,
V. Sevashkin
,
Ekaterina Samylovskaya
Effect of channel bonding and parallel data transmission with IEEE802.11n wireless LAN in a small sewer pipe
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Yuki Takei
,
Zhi Liu
,
Susumu Ishihara
Modified rendezvous scheme with inferring access channel probability of slave by master
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
Hayato Soya
,
Osamu Takyu
,
Keiichiro Shirai
,
Fumihito Sasamori
,
Shiro Handa
,
Mai Ohta
,
Takeo Fujii
Analysis of message delivery delay in large-scale geographic DTN routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Sumika Nishikawa
,
Daiki Matsui
,
Yasuhiro Yamasaki
,
Hiroyuki Ohsaki
Cognition for enhanced biometrie authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-244
by
Nataša Živić
,
Christoph Ruland
MAEC-X: DDoS prevention leveraging multi-access edge computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-248
by
Nhu-Ngoc Dao
,
Duc-Nghia Vu
,
Yunseong Lee
,
Minho Park
,
Sungrae Cho
Self-organizing map-based approaches in DDoS flooding detection using SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-254
by
Tran Manh Nam
,
Phan Hai Phong
,
Tran Dinh Khoa
,
Truong Thu Huong
,
Pham Ngoc Nam
,
Nguyen Huu Thanh
,
Luong Xuan Thang
,
Pham Anh Tuan
,
Le Quang Dung
,
Vu Duy Loi
A method for estimating process maliciousness with Seq2Seq model
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-260
by
Shun Tobiyama
,
Yukiko Yamaguchi
,
Hirokazu Hasegawa
,
Hajime Shimada
,
Mitsuaki Akiyama
,
Takeshi Yagi
Implementation and optimization of image acquisition with smartphones in computer vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-266
by
Lingyan Xiu
,
Bojiao Ma
,
Konglin Zhu
,
Lin Zhang
Information security problems in educational institutions in conditions of network interaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-269
by
Oleg A. Kozlov
,
Dmitriy G. Rodionov
,
Liudmilaa A. Guzikova
OVS-DPDK with TSO feature running under docker
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-273
by
Muhui Yang
,
Yihua Huang
SDN-based V2V offloading for cellular network using the LifeTime-based network state routing (LT-NSR)
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-279
by
Chung-Ming Huang
,
Meng-Shu Chiang
,
Wei-Long Su
,
Duy-Tuan Dao
Realization of flexible and scalable VANETs through SDN and virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-282
by
Ashutosh Bhatia
,
K. Haribabu
,
Kartikeya Gupta
,
Aakash Sahu
Software defined status aware routing in content-centric networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-288
by
Yueping Cai
,
Jun Liu
,
Xinwei Fan
,
Ya Qiu
,
Bing Tan
Analysis of deployment approaches for virtual customer premises equipment
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-291
by
Tri-Hai Nguyen
,
Trinh Nguyen
,
Myungsik Yoo
Link failure aware capacitated controller placement in software defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Bala Prakasa Rao Killi
,
Seela Veerabhadreswara Rao
A method of ECU software updating
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-303
by
Yutaka Onuma
,
Yoshiaki Terashima
,
Sumika Nakamura
,
Ryozo Kiyohara
Vehicle approaching model for T-junction during transition to autonomous vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-309
by
Tatsuro Hara
,
Ryozo Kiyohara
Reliable vehicle-to-vehicle communication using spectrum environment map
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-315
by
Shunsuke Tsurumi
,
Takeo Fujii
A trust based secure communication for software defined VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-321
by
Harsha Vasudev
,
Debasis Das
The deployment of mobile edges in vehicular environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-324
by
Hesham El-Sayed
,
Moumena Chaqfeh
A distributed cooperative MAC protocol with relay collision avoidance for wireless ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-330
by
Shan Wu
,
Kai Liu
,
Wenzhu Zhang
,
Zhen Xu
,
Feng Liu
,
Xiling Luo
Proposal of CQI table switching control method corresponding to 256-QAM for CRE in HetNet
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-335
by
Norihiro Naganuma
,
Kai Osawa
,
Jun Mashino
,
Satoshi Suyama
,
Hiroyuki Otsuka
Throughput analysis of multi-antenna based SWIPT relay network
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-340
by
Danish Mehmood Mughal
,
Syed Tariq Shah
,
Daniyal Munir
,
Kwang Hyun Park
,
Min Young Chung
Outage probability analysis of device-to-device communications with frequency reuse-2 in fractional frequency reuse method
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-345
by
Devarani Devi Ningombam
,
Seokjoo Shin
Exploring LTE-V link level performance by geometry enhanced winner II channel model
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-351
by
Gong Yi
,
Wang Shengchu
,
Zhang Yupeng
,
Luo Feng
,
Zhang Lin
Influence of phase error on OFDM-based 4096-QAM with turbo coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-355
by
Ruxiao Tian
,
Tomoki Ota
,
Hiroyuki Otsuka
FTN-based MIMO transmission for efficient coexistence of broadband and sporadic traffics
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-358
by
Ameha T. Abebe
,
Chung G. Kang
SINR-ordered cross link interference control scheme for dynamic TDD in 5G system
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-361
by
Jae Won Lee
,
Chung G. Kang
,
Min Joong Rim
Cell selection scheme for handover reduction based on moving direction and velocity of UEs for 5G multi-layered radio access networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-367
by
Akira Kishida
,
Yoshifumi Morihiro
,
Takahiro Asai
,
Yukihiko Okumura
Joint clustering and routing protocol for static 3D wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-373
by
Abhishek Joshi
,
Sarang Dhongdi
,
Ankit
,
K R Anupama
Optimization of LTE uplink performance in multivendor heterogeneous networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-379
by
Jussi Turkka
,
Olivia
,
Myleen Dosado Villaluz
,
Simon Foo
A multi-game approach for effective co-existence in unlicensed spectrum between LTE-U system and Wi-Fi access point
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-385
by
Anupam Kumar Bairagi
,
Nguyen H. Tran
,
Choong Seon Hong
Fair slot assignment in elastic optical networks under dynamic traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-390
by
Nasim Ravi
,
Aysegul Yayimli
Secure cloud computing algorithm using homomorphic encryption and multi-party computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-396
by
Debasis Das
The effect of datagram size and susceptible population on the epidemiology of fast self-propagating malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-401
by
Luc Tidy
,
Steve Woodhead
Identity based security for authentication and mobility in future ID oriented networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-407
by
Rongfei Wan
,
Bin Da
,
Richard Li
,
Chuang Wang
,
Hongpei Li
Intelligent sensor network for fence protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-413
by
Balázs Vőneki
Data trustworthiness in IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
Sabah Suhail
,
Choong Seon Hong
,
M. Ali Lodhi
,
Faheem Zafar
,
Abid Khan
,
Faisal Bashir
3TAAV: A three-tier architecture for pseudonym-based anonymous authentication in VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Ganesh Bellikar
,
Ashutosh Bhatia
,
R. C. Hansdah
,
Sudhanshu Singh
An airborne communication relay scheme for IEEE 802.11 WLAN based network
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-431
by
Dongjune Lee
,
Jaesung Lim
,
Hoki Baek
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-437
by
Jongho Moon
,
Youngsook Lee
,
Hyungkyu Yang
,
Taeui Song
,
Dongho Won
Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-441
by
Chunyi Quan
,
Jaewook Jung
,
Hakjun Lee
,
Dongwoo Kang
,
Dongho Won
Response driven efficient task load assignment in mobile crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-446
by
Shashi Raj Pandey
,
Choong Seon Hong
Cloud of things based on linked data
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-449
by
Yun-Hee Son
,
Kyu-Chul Lee
Beam Division Multiple Access (BDMA) and modulation formats for 5G: Heir of OFDM?
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-455
by
Pankaj Kumar Dalela
,
Pramod Bhave
,
Pushpender Yadav
,
Anshul Yadav
,
Vipin Tyagi
Reservation-based cooperative traffic management at an intersection of multi-lane roads
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-460
by
Myungwhan Choi
,
Areeya Rubenecia
,
Hyo Hyun Choi
An efficient improvement potential-based virtual network function selection scheme for reliability/availability improvement
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-463
by
Thanh Dinh
,
Younghan Kim
Video streaming service and CD sales
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-469
by
Kenichi Yoshida
,
Tomonori Manabe
Broadcast MAC protocol using relative distance for periodic safety messages in vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-472
by
Yafeng Deng
,
Young-June Choi
Blockchain: Challenges and applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-475
by
Pinyaphat Tasatanattakool
,
Chian Techapanupreeda
Weighted frequency hopping control in TDL for coexistence of satellite spectrum
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-481
by
Seonjoo Choi
,
Jaesung Lim
,
Hoki Baek
Mobile augmented reality on web-based for the tourism using HTML5
Full-text access may be available. Sign in or learn about subscription options.
pp. 482-485
by
Piyapong Dangkham
An efficient rate adaptation algorithm for streaming over HTTP
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-491
by
Waqas ur Rahman
,
Kwangsue Chung
Design of marine environment monitoring system based on open source softwares
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-494
by
Sun Park
,
JongWon Kim
,
ByungRae Cha
Showing 100 out of 200
Load More
Load All