Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Big Data Analysis Using Apache Hadoop
Manikandan, Shankar Ganesh, Ravi, Siddarth
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Smart Recycle Bin: A Conceptual Approach of Smart Waste Management with Integrated Web Based System
Abd Wahab, Mohd Helmy, Kadir, Aeslina Abdul, Tomari, Mohd Razali, Jabbar, Mohamad Hairol
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
A User Centric Identity Management for Internet of Things
van Thuan, Do, Butkus, Pranas, van Thanh, Do
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Network-Based Visualization of Opinion Mining and Sentiment Analysis on Twitter
Molla, Alemu, Biadgie, Yenewondim, Kyung-Ah Sohn
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
A Code Based Fruit Recognition Method Via Image Convertion Using Multiple Features
Jang-yoon Kim, Vogl, Michael, Shin-Dug Kim
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology
Seokcheol Lee, Yongmin Park, Hyunwoo Lim, Taeshik Shon
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Ensuring Data Security by AES for Global Software Development in Cloud Computing
Usman, Muhammad, Akram, Usman
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Object Tracking Methods in Wireless Sensor Network: Network Structure Classification
Darman, Rozanawati, Ithnin, Norafida
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
A Study on Implementation of IVI Applications for Connected Vehicle Using HTML5
Son, Insick, Han, Kabsu, Park, Daejin, Di Yin, Meng, Cho, Jeonghun
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Design and Implementation of Display Module for Electronic Navigational Chart Data
GeunHong Park, Daewon Park, Suhyun Park
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Validating UI through UX in the Context of a Mobile - Web Crowdsourcing Disaster Management Application
Estuar, Maria Regina, de Leon, Marlene, Santos, Maria Dianne, Ilagan, John Owen F., May, Barbara Anne
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Study on Datamining Techinique for Foot Disease Prediction
Jung-Kyu Choi, Chan Il Yoo, Kyung-Ah Kim, Yonggwan Won, Jung-Ja Kim
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Massive Open Online Course (MOOC) with Learning Objects and Intelligent Agent Technologies
Ong Sing Goh, Abd Ghani, Mohd Khanapi, Kumar, Yogan Jaya, Yun-Huoy Choo, Muda, Azah Kamilah
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Pruning Algorithm for Multi-Objective Optimization with Decision Maker's Preferences of System Redundancy Allocation Problem
Sooktip, Tipwimol, Wattanapongsakorn, Naruemon
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device
Jong-Yeon Park, Jung-Nyeo Kim, Jae-Dock Lim, Dong-Guk Han
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding