Information science and applications 2017 : ICISA 2017
This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most...
Saved in:
| Corporate Author | |
|---|---|
| Other Authors | , |
| Format | Electronic eBook |
| Language | English |
| Published |
Singapore :
Springer,
2017.
|
| Series | Lecture notes in electrical engineering ;
v. 424. |
| Subjects | |
| Online Access | Full text |
| ISBN | 9789811041549 9789811041532 |
| Physical Description | 1 online resource |
Cover
Table of Contents:
- Preface; Organization; General Chairs; Steering Committee; Publicity Chairs; Workshop Chair; Publication Chair; Program Chair; Financial Chairs; Organizers and Supporters ; Program Committee; Contents; Ubiquitous Computing; Improving Performance and Energy Efficiency for OFDMA Systems Using Adaptive Antennas and CoMP; Abstract; 1 Introduction; 2 CoMP and Semi-smart Antennas; 3 Genetic Algorithm Configuration; 3.1 Encoding and Decoding; 3.2 Fitness Function; 3.3 Constraint Handling; 3.4 Simulation Parameters; 4 Simulation Result; 5 Conclusion; References.
- Privacy in Location Based Services: Protection Strategies, Attack Models and Open ChallengesAbstract; 1 Introduction; 1.1 Location Privacy and Its Need; 2 Privacy Protection Strategies and Mechanisms; 2.1 Regulatory Strategies; 2.2 Policy Based; 2.3 Location Obfuscation; 2.4 Data Transformation; 2.5 PIR Based Location Privacy; 3 Common Attacks and Challenges in Location Privacy; 4 Open Challenges and Future Research Directions; 5 Conclusion; References; An Efficient and Low-Signaling Opportunistic Routing for Underwater Acoustic Sensor Networks; 1 Introduction; 2 The Details of DUOR.
- 2.1 Every Node Updates Its Own Hop-Count2.2 The Sensor Node Sends the Packet; 2.3 The Intermediate Nodes Forward the Packet; 2.4 The Sink Node Receives the Packet; 3 Simulations and Discussions; References; A Novel Mobile Online Vehicle Status Awareness Method Using Smartphone Sensors; Abstract; 1 Introduction; 2 The Mobile Online Vehicle Status Awareness System (MOVSAS); 2.1 Data Preprocessing; 2.2 Using PCA for Feature Selection; 2.3 Online Training Model; 3 Experiment and Results; 3.1 Experiment Environment; 3.2 Data Collection; 3.3 The Accuracy of Vehicle Status Awareness.
- 3.4 The Processing Time4 The Conclusion and Future Work; References; A Study on OPNET State Machine Model Based IoT Network Layer Test; Abstract; 1 Introduction; 2 OPNET Modelling for Test Case Generation; 2.1 IoT Network Layer and OPNET Simulation; 2.2 Network Layer State Machine for Test Case Generation; 3 Experiment Result and Analysis; 4 Conclusions; References; A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks; Abstract; 1 Introduction; 2 Confidence Constraint Based Secure Localization Algorithm.
- 2.1 Confidence Constraint of Reference Nodes2.2 Confidence Constraint Satisfaction Problem; 3 Performance Evaluation; Acknowledgment; References; Networks and Information Systems; Generating Time Series Simulation Dataset Derived from Dynamic Time-Varying Bayesian Network; Abstract; 1 Introduction; 2 Method; 2.1 Preliminaries; 2.2 Algorithm; 3 Result; 4 Conclusion; Acknowledgement; References; AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure Network; Abstract; 1 Introduction; 2 AMI Network Architecture; 3 The Design of AMI Network Simulator.