Search Results - "2013 International Conference on Computing, Management and Telecommunications"

Refine Results
  1. 1

    Human posture recognition using human skeleton provided by Kinect by Le, Thi-Lan, Nguyen, Minh-Quoc, Nguyen, Thi-Thanh-Mai

    “…Human posture recognition is an attractive and challenging topic in computer vision because of its wide range of application. The coming of low cost device…”
    Get full text
    Conference Proceeding Journal Article
  2. 2

    On the performance of Amplify-and-Forward OFDM relaying with subcarrier mapping in Nakagami-m fading channels by Al-Qahtani, F. S., Dac-Binh Ha, Tuong-Duy Nguyen, Alnuweiri, H.

    “…In orthogonal frequency division multiplexing (OFDM) relay system, subcarrier mapping at the relay has been shown to substantially improve the performance…”
    Get full text
    Conference Proceeding Journal Article
  3. 3

    Detection of replay attacks in smart grid systems by Tran, Thien-Toan, Shin, Oh-Soon, Lee, Jong-Ho

    “…Smart grid has many advantages compared with the traditional power grid, and will soon become new infrastructure for power generation, delivery, and…”
    Get full text
    Conference Proceeding Journal Article
  4. 4

    Potential of information-centric wireless sensor and actor networking by Dinh, Ngoc-Thanh, Kim, Younghan

    “…In this article, we introduce the application field, challenges, and concept of information-centric networking (ICN) approach as a fundamental driver for…”
    Get full text
    Conference Proceeding Journal Article
  5. 5

    Using cooperative MIMO techniques and UAV relay networks to support connectivity in sparse Wireless Sensor Networks by Marinho, M.A.M., de Freitas, E.P., Lustosa da Costa, Joao Paulo C., de Almeida, A.L.F., de Sousa, R.T.

    “…One possible way to define the end of lifetime for a Wireless Sensor Network (WSN) is to set a threshold for the number of disconnections among the sensor…”
    Get full text
    Conference Proceeding Journal Article
  6. 6

    Resource allocation scheme for device-to-device communications underlaying cellular networks by Duong, Quang, Shin, Yoan, Shin, Oh-Soon

    “…Device-to-Device (D2D) communication will become an important technology in future wireless networks with increasing demand for local communication services…”
    Get full text
    Conference Proceeding Journal Article
  7. 7

    The determinant of adoption in cloud computing in Vietnam by Chang, Byeong-Yun, Hoang Hai, Pham, Seo, Dong-Won, Lee, Jong-Hun, Hyun Yoon, Seung

    “…Cloud computing can bring many advantages for companies such as cost efficiency, reducing time to access to the market, ease to use, flexibility and…”
    Get full text
    Conference Proceeding Journal Article
  8. 8

    Heuristic algorithm and cooperative relay for energy efficient data collection with a UAV and WSN by Ho, Dac-Tu, Grotli, Esten Ingar, Johansen, Tor Arne

    “…This work 1 presents a heuristic algorithm for optimizing the average total energy consumed by the ground-based nodes in data collection applications with an…”
    Get full text
    Conference Proceeding Journal Article
  9. 9

    Impact of primary networks on the performance of secondary networks by Hung Tran, Hagos, M. A., Mohamed, M., Zepernick, H.

    “…In this paper, we investigate the performance of a single-input and multiple-output cognitive radio network over Rayleigh fading. In particular, we assume that…”
    Get full text
    Conference Proceeding Journal Article
  10. 10

    Computer aided plant identification system by Ngoc-Hai Pham, Thi-Lan Le, Grard, P., Van-Ngoc Nguyen

    “…Human pressure on the environment has steadily increased throughout the last few decades, especially in Southeast Asia. This part of the world is also…”
    Get full text
    Conference Proceeding Journal Article
  11. 11

    Virtual machine allocation in cloud computing for minimizing total execution time on each machine by Thang Nguyen, Quyet, Quang-Hung, Nguyen, Huynh Tuong, Nguyen, Tran, Hoai, Thoai, Nam

    “…This paper considers a virtual machine allocation problem. Each physical machine in cloud has a lot of virtual machines. Each job needs to use a number of…”
    Get full text
    Conference Proceeding Journal Article
  12. 12

    Collaborative filtering in social networks: A community-based approach by The Anh Dang, Viennet, E.

    “…Recommender systems (RS) are found in many online applications where users are exposed to huge sets of items. The goal of recommender systems is to provide the…”
    Get full text
    Conference Proceeding Journal Article
  13. 13

    A collaborative model for routing in multi-domains OpenFlow networks by Xuan Thien Phan, Nam Thoai, Kuonen, P.

    “…OpenFlow is an innovative network architecture which decouples control plane and data plane, allowing researchers the ability to program their networks,…”
    Get full text
    Conference Proceeding Journal Article
  14. 14

    Frequency Reconfigurable Stacked Patch Microstrip Antenna (FRSPMA) for LTE and WiMAX applications by Ramli, N., Ali, M. T., Yusof, A. L., Ya'acob, N.

    “…This paper presents the frequency reconfigurable antenna that can be applied either in LTE (2.6 GHz) or WiMAX (3.5 GHz) applications. This antenna is designed…”
    Get full text
    Conference Proceeding Journal Article
  15. 15

    Evaluating image steganography techniques: Future research challenges by Roy, R., Changder, S., Sarkar, A., Debnath, N. C.

    “…Steganography is the art of "concealed writing" and it refers to techniques that hide information inside innocuous looking objects known as "Cover Objects"…”
    Get full text
    Conference Proceeding Journal Article
  16. 16

    EPS mutual authentication and crypt-analyzing SPAKA by Abdo, J. B., Demerjian, J., Ahmad, K., Chaouchi, H., Pujolle, G.

    “…LTE's success as a high throughput, low latency, and umbrella technology for wireless heterogeneous networks is highly affected by the researchers' capability…”
    Get full text
    Conference Proceeding Journal Article
  17. 17

    Quality of experience hourglass model by Minhas, T. N., Fiedler, M.

    “…Recently, user perception has been receiving increasingly much attention of service providers, operators, manufactures and researchers. They are interested to…”
    Get full text
    Conference Proceeding Journal Article
  18. 18

    A cooperation scheme based on reputation for opportunistic networks by Xu, Shuzhen, Li, Mingchu, Chen, Yuanfang, Shu, Lei, Gu, Xin

    “…Opportunistic networks utilize the communication opportunities arising from node movement to forward messages. So the reliability of message transmission…”
    Get full text
    Conference Proceeding Journal Article
  19. 19

    Wireless Sensor Network for multi-storey building: Design and implementation by Vo, Minh-Thanh, Tran, Van-Su, Nguyen, Tuan-Duc, Huynh, Huu-Tue

    “…In recent years, Wireless Sensor Network(WSN) is considered as a potential solution for home automation because of its reliability, low-cost, low-power…”
    Get full text
    Conference Proceeding Journal Article
  20. 20

    Cost and efficiency-based scheduling on a general framework combining between cloud computing and local thick clients by Doan Man, Nguyen, Huh, Eui-Nam

    “…Today, the rapid growth of the large-scale applications conduces to a difficult challenge to individuals as well as the commercial organizations due to the…”
    Get full text
    Conference Proceeding Journal Article