Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ITNAC
ITNAC 2019
Generate Citations
2019 29th International Telecommunication Networks and Applications Conference (ITNAC)
Nov. 27 2019 to Nov. 29 2019
Auckland, New Zealand
ISBN: 978-1-7281-3673-8
Table of Contents
Index
Freely available from IEEE.
pp. 1-1
2019 29th International Telecommunication Networks and Applications Conference (ITNAC)
Freely available from IEEE.
pp. 1-5
Welcome Message
Freely available from IEEE.
pp. 1-1
Technical Program Committee Welcome
Freely available from IEEE.
pp. 1-2
Committees
Freely available from IEEE.
pp. 1-2
Sponsors
Freely available from IEEE.
pp. 1-6
Keynote Speakers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
Program
Freely available from IEEE.
pp. 1-27
Technical Program Committee
Freely available from IEEE.
pp. 1-5
Additional Reviewers
Freely available from IEEE.
pp. 1-1
Authors
Freely available from IEEE.
pp. 1-5
Green Multi-Stage Upgrade for Bundled-Link SDNs with Budget Constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Lely Hiryanto
,
Sieteng Soh
,
Kwan-Wu Chin
,
Mihai Lazarescu
Two-Tier Spectrum Trading Strategy for Heterogeneous Cognitive Radio Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiaowen Huang
,
Wenjie Zhang
,
Liwei Yang
,
Chai Kiat Yeo
,
Shengyu Chen
Load-balancing In Software-Defined Networking: An Investigation On Influential System Parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Amir Hossein Moravejosharieh
,
Francisco Claudio Araujo Palmeira
Realization of congestion-aware energy-aware virtual link embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Minh Pham
,
Doan B. Hoang
,
Zenon Chaczko
Max-cut and min-flow theorem for coal-transportation networks based on fault-tolerant routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Da-Ren Chen
,
Hao-Yen Chang
,
Ye-Zheng Chen
An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xue Jun Li
,
Maode Ma
,
Narayanan Arjun
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jerzy Konorski
Adaptive Control of Nonstatistical Sensor Data Aggregation to Minimize Latency in IoT Gateways
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Hideaki Yoshino
,
Kenko Ota
,
Takefumi Hiraguri
Relay Selection Scheme for Energy Harvesting IoT Networks with Direct Link
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Chenchen Liu
,
Yuyang Zheng
,
Zhengyu Zhang
,
Weilong Ren
Energy Efficiency Optimization in Energy Harvesting Two-Hop Half-duplex Relay Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jing Zhao
,
Chenchen Liu
,
Zhengyu Zhang
,
Shibin Zhang
,
Ming Zhao
Frame Synchronization Performance of Optical-Wireless Hybrid BPPM-OOK System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Tomohiro Kiguchi
,
Ran Sun
,
Hiromasa Habuchi
,
Yusuke Kozawa
Outdoor Signal Performance of LoRaWAN Technology for Campus-Scale IoT Connectivity
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Rais Rizal Yunus
,
Husna Zainol Abidin
,
Fadhlan Hafizhelmi Kamaru Zaman
,
Syahrul Afzal Che Abdullah
A Novel Entitlement-based Blockchain-enabled Security Architecture for IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Fariza Sabrina
A Method for Comparing OpenFlow and P4
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Paul Zanna
,
Pj Radcliffe
,
Karina Gomez Chavez
Theoretical Analysis of Equal-Weight (2, 2) VSS on VN-CSK Illumination Light Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Keisuke Manaka
,
Liyuan Chen
,
Hiromasa Habuchi
,
Yusuke Kozawa
Development of a Supply Chain Product Monitoring Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Darryn Wells
,
Fakhrul Alam
,
Yi Chen
,
Robert Abbel
,
Kate Parker
Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xue Jun Li
,
Maode Ma
,
Yi Lin Yen
Compact Multiband Frequency Reconfigurable Antenna for 5G Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Adnan Ghaffar
,
Xue Jun Li
,
Boon-Chong Seet
,
Wahaj Abbas Awan
,
Niamat Hussain
Design and Implementation of Wi-Fi Based Attendance System Using Raspberry Pi
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Archana Banepali
,
Rajan Kadel
,
Deepani B. Guruge
,
Sharly J. Halder
Demystifying LoRa WAN Security and Capacity
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Michael Santamaria
,
Alan Marchiori
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
James Jin Kang
,
Kiran Fahd
,
Sitalakshmi Venkatraman
,
Rolando Trujillo-Rasua
,
Paul Haskell-Dowland
Music Response Based on Real-time Facial Expression Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
DaiLun Chiang
,
JihHsiang Yang
,
ZiYuan Huang
,
FeiPei Lai
A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yong Jin
,
Masahiko Tomoishi
Early Warning System with Real Time Tilt Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Baden Parr
,
Daniel Konings
,
Mathew Legg
,
Fakhrul Alam
Unsplittable flow Edge Load factor Balancing in SDN using P4 Runtime
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Eiichiro Kawaguchi
,
Hikaru Kasuga
,
Norihiko Shinomiya
Dynamic Resource Allocation for Visible Light Communications (VLC)- WiFi Heterogeneous Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Liwei Yang
,
Wenjie Zhang
,
Lining Deng
,
Junning Zhang
Download Traffic Scheduling for CubeSats Swarms with Inter-Satellite Links
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yawen Zheng
,
Kwan-Wu Chin
,
Luyao Wang
Mininet Topology: Mirror of the Optical Switch Fabric
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sadia Qureshi
,
Robin Braun
Leveraging CNN and Transfer Learning for Vision-based Human Activity Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Samundra Deep
,
Xi Zheng
Performance Analysis of Defused VLC Channel for Mobile Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Shakir Ullah
,
Saeed Ur Rehman
,
Peter Hoon Joon Chong
Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function Chaining
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Nguyen Canh Thang
,
Minho Park
Link Scheduling for Data Collection in SIC-Capable UAV Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yawen Zheng
,
Kwan-Wu Chin
Blockchain Enabled Opportunistic Fog-based Radio Access Network: A Position Paper
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Jofina Jijin
,
Boon-Chong Seet
,
Peter Han Joo Chong
Improving Prediction Accuracy for Power Consumption in Virtual Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Humaira Abdul Salam
,
Franco Davoli
,
Andreas Timm-Giel
A proposal of information diffusion model using information vitality
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Yuya Ota
,
Norihiko Shinomiya
Feature Selection: Multi-source and Multi-view Data Limitations, Capabilities and Potentials
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Marianne Cherrington
,
Joan Lu
,
David Airehrour
,
Fadi Thabtah
,
Qiang Xu
,
Samaneh Madanian
A Context-Aware and Technology-Assisted Informal Caregiver Selection Method to support Medical Emergency
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Md Akbar Hossain
,
Sayan Kumar Ray
,
Seyed Reza Shahamiri
Supercomputer Networks in the Datacenter: Benchmarking the Evolution of Communication Granularity from Macroscale down to Nanoscale
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Firas Al-Ali
,
Thilina Doremure Gamage
,
Hewa WTS Nanayakkara
,
Farhad Mehdipour
,
Sayan Kumar Ray
An Orientation Aware Learning MAC for Multi-UAVs Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Saadullah Kalwar
,
Kwan-Wu Chin
,
Luyao Wang
Analog Least Mean Square Loop for Self-Interference Cancellation: Implementation and Measurements
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Anh Tuyen Le
,
Le Chung Tran
,
Xiaojing Huang
,
Y. Jay Guo
UAV-aided Data Collection in Self Organized IoT Network for Social Augmented Reality
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Zhenjie Tan
,
Hua Qu
,
Jihong Zhao
,
Shiyu Zhou
,
Wenjie Wang
Hierarchical Architecture for Computational Offloading in Autonomous Vehicle Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Arslan Rasheed
,
Asim Anwar
,
Arun Kumar
,
Peter Han Joo Chong
,
Xue Jun Li
Decoding Latency of LDPC Codes in 5G NR
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Hao Wu
,
Huayong Wang
Performance Analysis of Clustering Algorithms for Content-Sharing Based D2D Enabled 5G Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Saad Aslam
,
Fakhrul Alam
,
Syed Faraz Hasan
,
Mohammad Rashid
Device to Device Collaboration Architecture for Real- Time Identification of User and Abnormal Activities in Home
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Seong Su Keum
,
Cheol Hwan Lee
,
Soon Ju Kang
Evaluating TCP Connection Healthiness
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Nils Rodday
,
Raphael Labaca Castro
,
Klement Streit
,
Gabi Dreo Rodosek
A Novel Relaying Mechanism for Multi-Cast Transmission with Ground-Aerial NOMA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Syeda Kanwal Zaidi
,
Syed Faraz Hasan
,
Xiang Gui
Performance Analysis of Random Backoff based D2D Discovery in Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhongyang Yu
,
Boon-Chong Seet
Non-Centralised and Non-GPS Navigation Mechanism using IoT sensors: challenges and trade-offs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Debraj Basu
,
Xiang Gui
,
Yi Zhang
,
Avishek Nag
Decentralized Interference Mitigation Technique for D2D Networks Using Game Theory Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Saad Aslam
,
Fakhrul Alam
,
Syed Faraz Hasan
,
Mohammad Rashid
The Inference Graph of Cybersecurity Rules
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Dawood Sheniar
,
Nabeel Hadaad
,
Ron Addie
A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Shakil Ahmed
,
Mohammad Rashid
,
Fakhrul Alam
,
Bapon Fakhruddin
Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Noah Oghenefego Ogwara
,
Krassie Petrova
,
Mee Loong Yang
Ambient Intelligence for Smart Home using The Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Hakilo Sabit
,
Peter Han Joo Chong
,
Jeff Kilby
Steganalysis of Storage-based Covert Channels Using Entropy
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jun O Seo
,
Sathiamoorthy Manoharan
,
Ulrich Speidel
Dynamic RNN -CNN based Malware Classifier for Deep Learning Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Youngbok Cho
Rate Matching Pattern Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Byoungjo Choi
,
Stevan Berber
SDN-based Wireless Access Networks Utilising BBR TCP Congestion Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hoang Do
,
Mark A Gregory
,
Shuo Li
Digital Forensic Readiness In Wireless Medical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
ArKar Kyaw
,
Brian Cusack
,
Raymond Lutui
Utilising SDN to Counter BGP Convergence Delays
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Hamad Alotaibi
,
Shuo Li
,
Mark A Gregory
Analysis of Staircase Power Distributions for Reduced Number of Power Levels for 5G Planar Array Antenna Analog Beamforming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Muhsiul Hassan
,
Nazmus Shaker Nafi
,
Nguyen Vo
,
Rahul Thakkar
,
Mark A. Gregory
Improvised MANET Selfish Node Detection using Artificial Immune System based Decision Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Lincy Elizebeth Jim
,
Mark A Gregory
A Weight Based Channel Scheduling for LTE-A Femtocells
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Omar Arafat
,
Mark A Gregory
A Cloud-Based Traffic Flow Framework for Tactile Internet using SDN and Fog Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Vaibhav Fanibhare
,
Nurul I Sarkar
,
Adnan Al-Anbuky
5G and the Future of Security in ICT
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
David Soldani
Showing 76 out of 76