default search action
4th ICICT 2019: London, UK
- Xin-She Yang, R. Simon Sherratt, Nilanjan Dey, Amit Joshi:
Fourth International Congress on Information and Communication Technology - ICICT 2019, London, UK, February 25-26, 2019, Volume 1. Advances in Intelligent Systems and Computing 1041, Springer 2020, ISBN 978-981-15-0636-9 - Mike Krey:
Wearable Device Technology in Healthcare - Exploring Constraining and Enabling Factors. 1-13 - Heba Fawzy, Dalia A. Magdi:
Proposed System for Effective Adoption of E-government to Obtain Construction Permit in Egypt. 15-32 - Ralf-Christian Härting, Christopher Reichstein:
Potential Use of Bitcoin in B2C E-commerce. 33-40 - Atieh Mahroo, Daniele Spoladore, Massimiliano Nolich, Raol Buqi, Sara Carciotti, Marco Sacco:
Smart Cabin: A Semantic-Based Framework for Indoor Comfort Customization Inside a Cruise Cabin. 41-53 - Christian Nigro, Libero Nigro, Paolo F. Sciammarella:
Formal Modeling and Analysis of Probabilistic Real-Time Systems. 55-72 - Nassr Azeez, Wafa Yahya, Inas Al-Taie, Arwa M. Basbrain, Adrian F. Clark:
Regional Agricultural Land Classification Based on Random Forest (RF), Decision Tree, and SVMs Techniques. 73-81 - Hery Frédéric Rakotomalala, André Totohasina:
On Hierarchical Classification Implicative and Cohesive M_GKMGK-Based: Application on Analysis of the Computing Curricula and Students Abilities According the Anglo-Saxon Model. 83-90 - Seyed Sahand Mohammadi Ziabari, Jan Treur:
A Modeling Environment for Dynamic and Adaptive Network Models Implemented in MATLAB. 91-111 - Guy Leshem, Menachem Domb:
Face Authentication Using Image Signature Generated from Hyperspectral Inner Images. 113-125 - Rayner Alfred, Chew Ye Lun:
Unsupervised Learning of Image Data Using Generative Adversarial Network. 127-135 - Tamer Shanableh:
Adaptive Message Embedding in Raw Images. 137-146 - Alexander Raikov:
Megapolis Tourism Development Strategic Planning with Cognitive Modelling Support. 147-155 - Samuel Sangkon Lee:
Design and Implementation of Ancient and Modern Cryptography Program for Documents Security. 157-169 - S. Makarov Aleksei, Marina V. Bolsunovskaya:
Methodology for Selecting Cameras and Its Positions for Surround Camera System in Large Vehicles. 171-178 - Gennady Korshunov, Vladimir Smirnov, Elena Frolova, Stanislav Nazarevich:
Fuzzy Models and System Technical Condition Estimation Criteria. 179-189 - Arslan I. Enikeev, Rustam A. Burnashev, Galim Z. Vakhitov:
Software Tools and Techniques for the Expert Systems Building. 191-199 - Marek Beránek, Vladimír Kovár:
A Component-Based Method for Developing Cross-Platform User Interfaces for Mobile Applications. 201-217 - Irina Makarova, Ksenia Shubenkova, Timur A. Nikolaev, Krzysztof Zabinski:
Improvement of Vehicles Production by Means of Creating Intelligent Information System for the Verification of Manufacturability of Design Documentation. 219-228 - Ghaya Smidi, Aïcha Bouzid:
Group Delay Function Followed by Dynamic Programming Versus Multiscale-Product for Glottal Closure Instant Detection. 229-239 - Bernard Shibwabo Kasamani, Duncan Litunya:
Activity Logging in a Bring Your Own Application Environment for Digital Forensics. 241-257 - Hanane Saidi, Driss Gretete, Adnane Addaim:
Game Theory for Wireless Sensor Network Security. 259-269 - A. Chinna Veeresh, S. Venkata Siva Prasad, S. V. Hari Prasad, M. Soundarakumar, Vipin Tyagi:
DSP Implementation of OQPSK Baseband Demodulator for Geosynchronous Multichannel TDMA Satellite Receiver. 271-284 - P. R. Sriram, M. Muthu Manikandan, Nithin Ayyappaa, Rahul Murali:
Textile Sensor-Based Exoskeleton Suits for the Disabled. 285-292 - Brian Greaves, Marijke Coetzee, Wai Sze Leung:
A Comparison of Indoor Positioning Systems for Access Control Using Virtual Perimeters. 293-302 - Alishba Sadiq, Muhammad Usman, Shujaat Khan, Imran Naseem, Muhammad Moinuddin, Ubaid M. Al-Saggaf:
q-LMF: Quantum Calculus-Based Least Mean Fourth Algorithm. 303-311 - John Paul Kasse, Lai Xu, Paul de Vrieze, Yuewei Bai:
Process Driven Access Control and Authorization Approach. 313-322 - Stefan Ruseti, Maria-Dorinela Sirbu, Mihnea Andrei Calin, Mihai Dascalu, Stefan Trausan-Matu, Gheorghe Militaru:
Comprehensive Exploration of Game Reviews Extraction and Opinion Mining Using NLP Techniques. 323-331 - Omar Elharrouss, Noor Almaadeed, Somaya Al-Máadeed:
MHAD: Multi-Human Action Dataset. 333-341 - Chamalka Seneviratne Kalansuriya, Achala Chathuranga Aponso, Artie Basukoski:
Machine Learning-Based Approaches for Location Based Dengue Prediction: Review. 343-352 - Gayakshika Gimhani, Achala Chathuranga Aponso, Naomi Krishnarajah:
Critical Evaluation of Different Biomarkers and Machine-Learning-Based Approaches to Identify Dementia Disease in Early Stages. 353-364 - Dmitry Litovkin, Anton Anikin, Marina Kultsova:
Interactive Visualization of Ontology-Based Conceptual Domain Models in Learning and Scientific Research. 365-374 - Omar A. Abdulkader, Alwi M. Bamhdi, Vijey Thayananthan, Kamal Mansur Jambi, Bandar Al-Ghamdi, Ahmed Patel:
A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server. 375-384 - Lakshika Sammani Chandradeva, Thushara Madushanka Amarasinghe, Minoli De Silva, Achala Chathuranga Aponso, Naomi Krishnarajah:
Monetary Transaction Fraud Detection System Based on Machine Learning Strategies. 385-396 - Mandisa N. Nxumalo, Matthew O. Adigun, Ijeoma N. Mba:
The Impact of Service-Level Agreement (SLA) on a Cloudlet Deployed in a Coffee Shop Scenario. 397-406 - Meropi Pavlidou, George Zioutas:
A New Use of Doppler Spectrum for Action Recognition with the Help of Optical Flow. 407-418 - Toni Perkovic, Slaven Damjanovic, Petar Solic, Luigi Patrono, Joel J. P. C. Rodrigues:
Meeting Challenges in IoT: Sensing, Energy Efficiency, and the Implementation. 419-430 - Raed Saadoon, Raid Sakat, Maysam Abbod, Hasanein Hasan:
Small Cells Handover Performance in Centralized Heterogeneous Network. 431-447 - Jhon Montalvo-Garcia, Juan Bernardo Quintero, Bell Manrique-Losada:
CRISP-DM/SMEs: A Data Analytics Methodology for Non-profit SMEs. 449-457 - Orlando Gardella, Broderick Crawford, Ricardo Soto, José Lemus-Romani, Gino Astorga, Agustín Salas-Fernández:
Bridges Strengthening by Conversion to Tied-Arch Using Monarch Butterfly Optimization. 459-469 - Zhiqiang Liu, Mohi-Ud-Din Ghulam, Ye Zhu, Xuanlin Yan, Lifang Wang, Zejun Jiang, Jianchao Luo:
Deep Learning Approach for IDS - Using DNN for Network Anomaly Detection. 471-479 - Mohammed Aseeri, Oussama Ghorbel, Hamoud H. Alshammari, Ahmed S. Alabdullah, Mohamed Abid:
Outlier Detection Method-Based KPCA for Water Pipeline in Wireless Sensor Networks. 481-488 - Mário Cardoso, Tiago Guimarães, Carlos Filipe Portela, Manuel Filipe Santos:
Data Extraction and Exploration Tools for Business Intelligence. 489-497 - Craig S. Wright:
Systems and Methods for Implementing Deterministic Finite Automata (DFA) via a Blockchain. 499-512 - Sanjay Gaur, Darshanaben D. Pandya, Deepika Soni:
Closest Fit Approach Through Linear Interpolation to Recover Missing Values in Data Mining. 513-521
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.