Suchergebnisse - "2012 2nd International Conference on Computer Science and Network Technology"
-
1
Sensing-throughput tradeoff for interference-aware cognitive radio networks
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… Nowadays cognitive radio networks (CRNs) have been proposed as a promising method to solve the problem of radio spectrum shortage and spectrum sensing has been …”
Volltext
Tagungsbericht -
2
Acceleration of MPC using graphic processing unit
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… Model Predictive control (MPC) algorithm owns good performance but causes heavy computational burden. This disadvantage makes it only applied for small systems …”
Volltext
Tagungsbericht -
3
Utility-based load distribution for QoS provisioning and utility maximization in wireless random access networks
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… In this paper, a utility-based load distribution approach is introduced for relieving congestion at certain popular spaces within the network …”
Volltext
Tagungsbericht -
4
Voting affinity propagation algorithm for clustering XML documents
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… Affinity propagation algorithm(AP) is a new powerful tool for unsupervised clustering. Yet AP can't work well as expected on the datasets with high-similarity …”
Volltext
Tagungsbericht -
5
A mutation-based fuzz testing approach for network protocol vulnerability detection
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… Mutation-based fuzz testing is a very effective approach to improve the security and reliability of protocol implementations, however, present mutation-based …”
Volltext
Tagungsbericht -
6
A detection approach for solitary pulmonary nodules based on CT images
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… It has been indicated that detection of pulmonary nodules plays an important role in diagnosing lung cancer in early-stage. In this paper, we propose an …”
Volltext
Tagungsbericht -
7
The load balancing algorithm in cloud computing environment
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… With the users and the types of application on the cloud computing platform increasing, it becomes a critical problem about how to use the resources in the …”
Volltext
Tagungsbericht -
8
Research of space-object detection and tracking simulation system based on HLA
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… An expandable open simulation system structure based on HLA technology and against the background of detection and tracking ability analysis is designed …”
Volltext
Tagungsbericht -
9
Application of hyperspectral remote sensing in mineral identification and mapping
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… Hyperspectral remote sensing technology can identify mineral finely compared with traditional remote sensing techniques since many tens of bands are recorded …”
Volltext
Tagungsbericht -
10
Range expansion for pico cell in heterogeneous LTE - A cellular networks
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… In LTE-Advanced, a heterogeneous network (HetNet) where femtocells and picocells overlaid onto macrocells is extensively discussed in addition to traditional …”
Volltext
Tagungsbericht -
11
Application layer ddos detection using clustering analysis
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… Many methods were designed in previous literatures to protect systems from IP and TCP layers distributed denial of service attacks instead of the application …”
Volltext
Tagungsbericht -
12
The design and implementation of mobile communication base station inspection system based on Web technology
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… The Mobile Communication Base Station Inspection is one type of basic work to ensure safe operation of the base station equipment. By using the mobile …”
Volltext
Tagungsbericht -
13
A real-time automatic detection of phishing URLs
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… Phishing scam, a fraudulent attempt that masquerades as a trustworthy entity to obtain users' sensitive data, has become the most dangerous form of online …”
Volltext
Tagungsbericht -
14
Image segmentation based on Support Vector Machine
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… In content-based multimedia technologies, video object extraction has received more and more attention. In this paper, Support Vector Machine (SVM) is proposed …”
Volltext
Tagungsbericht -
15
A network traffic prediction model based on recurrent wavelet neural network
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… The network traffic prediction model is the foundation of network performance analysis and designing. The traditional traffic models have the weakness of …”
Volltext
Tagungsbericht -
16
A new trajectory clustering algorithm based on TRACLUS
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… Most trajectory clustering algorithms including the famous TRACLUS require the setting of two input parameters and are sensitive to input parameters. Incorrect …”
Volltext
Tagungsbericht -
17
Object-oriented and ontology context-aware modeling based on XML
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… In order to solve the problem of providing service to users by using context-aware modeling in pervasive computing, this paper proposes a context-aware …”
Volltext
Tagungsbericht -
18
Prediction of user interest based on collaborative filtering for personalized academic recommendation
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… The development of Internet provides academic researchers with abundant information, which also brings them heavier and heavier information burden, because to …”
Volltext
Tagungsbericht -
19
Saliency computation and simplification of point cloud data
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… According to human visual sensitivity, in this paper, we present a new simplification of point cloud based on point saliency. In order to find the nearest K …”
Volltext
Tagungsbericht -
20
Sentiment analysis of Chinese micro-blog using semantic sentiment space model
ISBN: 1467329630, 9781467329637Veröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 2nd International Conference on Computer Science and Network Technology (01.12.2012)“… Recently public, government, company and other forms of communities are extremely vocal about their opinions and perceptions on their appeals, policies and …”
Volltext
Tagungsbericht

