Search Results - "2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)"

Refine Results
  1. 1

    A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection by Jiaqi Yan, Dong Jin, Cheol Won Lee, Ping Liu

    “…Network intrusion detection systems (NIDS) are essential security building-blocks for today's organizations to ensure safe and trusted communication of…”
    Get full text
    Conference Proceeding
  2. 2

    Indoor Semantic Segmentation for Robot Navigating on Mobile by Wonsuk Kim, Junhee Seok

    “…In recent years, there have been many successes of using Deep Convolutional Neural Networks (DCNNs) in the task of pixel-level classification (also called…”
    Get full text
    Conference Proceeding
  3. 3

    Geolocation-Based Routing Protocol for Flying Ad Hoc Networks (FANETs) by Choi, Sung-Chan, Hussen, Hassen Redwan, Park, Jong-Hong, Kim, Jaeho

    “…Unmanned Aerial Vehicles (UAVs), also called drones, are getting a lot of attention in various application scenarios such as search and rescue missions,…”
    Get full text
    Conference Proceeding
  4. 4

    Real-Time Drowsiness Detection Algorithm for Driver State Monitoring Systems by Baek, Jang Woon, Han, Byung-Gil, Kim, Kwang-Ju, Chung, Yun-Su, Lee, Soo-In

    “…In this paper, we proposes a novel drowsiness detection algorithm using a camera near the dashboard. The proposed algorithm detects the driver's face in the…”
    Get full text
    Conference Proceeding
  5. 5

    Fuzzy Logic Based Network Selection in Hybrid OCC/Li-Fi Communication System by Hasan, Moh. Khalid, Shahjalal, Md, Chowdhury, Mostafa Zaman, Hossan, Md. Tanvir, Jang, Yeong Min

    “…For being highly energy efficient and inexpensive, the use of current commercial LEDs for transmitting data is considered as a significant milestone in the…”
    Get full text
    Conference Proceeding
  6. 6

    Spectrogram-Based Automatic Modulation Recognition Using Convolutional Neural Network by Jeong, Sinjin, Lee, Uhyeon, Kim, Suk Chan

    “…We study a system for classifying modulation types with spectrograms obtained through short-time Fourier transform. AWGN-based carrier modulated signals and…”
    Get full text
    Conference Proceeding
  7. 7

    A Machine-Learning-Based Handover Prediction for Anticipatory Techniques in Wi-Fi Networks by Feltrin, Mauro, Tomasin, Stefano

    “…Handover and blind spots in Wi-Fi networks generate temporary interruptions of connection between the devices and the access point, with major quality…”
    Get full text
    Conference Proceeding
  8. 8

    Automatic Sleep Stage Classification Using EEG and EMG Signal by Kim, Hyungjik, Choi, Sunwoong

    “…Sleep is a primary constituent of human life. It is important to maintain good sleep efficiency because some problems occur when sleep efficiency is low. Sleep…”
    Get full text
    Conference Proceeding
  9. 9

    Joint Clustering and Routing Protocol for 3-D Underwater Acoustic Sensor Network by Dhongdi, Sarang, Bhandari, Aashray, Singh, Jayati, Kachhadia, Spandan, Joshi, Varad

    “…When the network nodes are randomly deployed in three-dimensional Underwater Acoustic Sensor Network architecture, the working of initialization phase of a…”
    Get full text
    Conference Proceeding
  10. 10

    Design and Evaluation of a Hybrid D2D Discovery Mechanism in 5G Cellular Networks by Li, Mingfu, Tsai, Hsin-Ling

    “…Device-to-device (D2D) communications allow devices to communicate directly without using base stations for relaying, yielding several merits such as…”
    Get full text
    Conference Proceeding
  11. 11

    hyperCache: A Hypervisor-Level Virtualized I/O Cache on KVM/QEMU by Taehoon Kim, Seungho Choi, Jaechun No, Sung-Soon Park

    “…While VDI offers several benefits, such as the increased resource utilization and the private data protection, there exist problems that can deteriorate the…”
    Get full text
    Conference Proceeding
  12. 12

    Efficient Reconciliation Protocol with Polar Codes for Quantum Key Distribution by Lee, Sunghoon, Heo, Jun

    “…Information reconciliation is a critical process of any Quantum Key Distribution (QKD) protocol, where two legitimate parties agree on a secret key. Two…”
    Get full text
    Conference Proceeding
  13. 13

    Adaptive Broadcast Routing Assignment Algorithm for Blockchain Synchronization Services by Lin, Frank Yeong-Sung, Hsiao, Chiu-Han, Wen, Yean-Fu, Su, Yang-Che

    “…Transactions and blocks must be synchronized among the blockchain miners on the Internet. Software-defined networking and network function virtualization…”
    Get full text
    Conference Proceeding
  14. 14

    Error Mitigation in Optical Camera Communication Based Indoor Positioning System by Shahjalal, Md, Hasan, Moh Khalid, Hossan, Md. Tanvir, Chowdhury, Mostafa Zaman, Jang, Yeong Min

    “…Existing indoor lighting infrastructure such as light emitting diodes (LEDs) are able to transmit digital data by changing its luminary using proper modulation…”
    Get full text
    Conference Proceeding
  15. 15

    Fuzzy Energy Efficient Routing for Internet of Things (IoT) by Shah, Babar

    “…Internet of Things (IoT) envisions the idea of universal smart connectivity of everything between physical and digital world. Every smart device in IoT…”
    Get full text
    Conference Proceeding
  16. 16

    Leveraging OTT and ISP Cooperation to Enhance End to End QoS by Exchanging Valuable Resources by Scarlato, Michele, Ortiz, Jordi, Perra, Cristian, Skarmeta, Antonio

    “…Over The Top (OTT) provider detecting bad QoS for their users can not influence on the network by themselves. In the other hand, the Internet Service Providers…”
    Get full text
    Conference Proceeding
  17. 17

    Design of an SDN Security Mechanism to Detect Malicious Activities by Mansour, Christopher, Chasaki, Danai

    “…Software Defined Networks (SDN) is a modern networking paradigm that introduces lots of benefits to the next-generation networks. It offers the necessary…”
    Get full text
    Conference Proceeding
  18. 18

    Video Surveillance System Based on 3D Action Recognition by Park, Sungjoo, Kim, Dongchil

    “…Human action recognition using depth-map images from 3D camera for surveillance system is a promising alternative to the conventional 2D video based…”
    Get full text
    Conference Proceeding
  19. 19

    A Novel Approach to Make Presentation Using PowerPoint Without Projector in Local Area Network by Bataona, Daniel Silli, Munir, Rinaldi, Juhana, Tutun, Manulangga, Gloria Christiana, Sine, Jemsrado

    “…This research using a prototype method and results of this research tries to propose a new approach is to do a presentation material of powerpoint without the…”
    Get full text
    Conference Proceeding
  20. 20

    Improving Physical Layer Security of NOMA Networks by Using Opportunistic Scheduling by Shim, Kyusung, Do, Tri Nhu, An, Beongku

    “…In this paper, we study how to improve physical layer security capability of multiple near users and multiple far users non-orthogonal multiple access (NOMA)…”
    Get full text
    Conference Proceeding