Volume 5, Number 16, December 2015
Seventh International Conference on Networks & Communications (NETCOM - 2015), Sydney, Australia, December 26~27, 2015
Volume Editors : David C. Wyld, Natarajan Meghanathan (Eds)
ISBN : 978-1-921987-44-1 Download full Proceedings
Implementation of Joint Network Channel Decoding Algorithm for Multiple Access Relay Channel Based on Convolutional Codes
Youssef Zid1, Sonia Zaibi Ammar1 and Ridha Bouallegue2, 1National Engineering School of Tunis, Tunisia and 2Higher School of Communications of Tunis, Tunisia
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Nabil Giweli, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia
A Method of Target Tracking and Prediction Based on Geomagnetic Sensor Technology
Xinmin Tang1, Shangfeng Gao1, Songchen Han2, Zhiyuan Shen1, Liping Di2 and Binbin Liang2, 1Nanjing University of Aeronautics and Astronautics, China and 2Si Chuan University, China
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Joo Rak Kang and Tae-Jin Lee, Sungkyunkwan University, Korea
Harvested Energy-Adaptive MAC Protocol for Energy Harvesting IOT Networks
Hyeong-Kyu Lee, MinGyu Lee and Tae-Jin Lee, Sungkyunkwan University, South Korea
Table-Based Identification Protocol of Compuatational RFID Tags
Yunmin Kim, Ji Hyoung Ahn and Tae-Jin Lee, Sungkyunkwan University, South Korea
SOTM : A Self Organized Trust Management System for VANET
Amel Ltifi1, Ahmed Zouinkhi2 and Mohamed Salim Bouhlel1, 1Higher Institute of Biotechnology of Sfax, Tunisia and 2National Engineering school of Gabes, Tunisia
Reducing Latency in African NRENS Using Performance-Based LISP/SDN Traffic Engineering
Josiah Chavula, Melissa Densmore and Hussein Suleman, University of Cape Town, South Africa
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Yian Zhou1, You Zhou1, Shigang Chen1 and O. Patrick Kreidl2, 1University of Florida, USA and 2University of North Florida, USA
Selective Opening Secure Functional Encryption
Yuanyuan Ji, Haixia Xu and Peili Li, Chinese Academy of Sciences, China
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recent Developments
Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden
Security Analysis of Mobile Authentication Using QR-Codes
Siwon Sung1,2, Joonghwan Lee1,2, Jinmok Kim1,2, Jongho Mun2 and Dongho Won2, 1Samsung Electronics, Korea and 2Sungkyunkwan University, Korea
Application-Based QoS Evaluation of Heterogeneous Networks
Farnaz Farid, Seyed Shahrestani and Chun Ruan, Western Sydney University, Australia
BLE-Based Accurate Indoor Location Tracking for Home and Office
Joonghong Park1, Jaehoon Kim1 and Sungwon Kang2, 1Samsung Electronics, Republic of Korea and 2Korea Advanced of Science and Technology (KAIST), Republic of Korea
An Adaptive Remote Display Framework to Improve Power Efficiency
Dong Hyun, Jo1 and Dae Young, Kim2, 1Samsung Electronics, South Korea and 2Korea Advanced of Science and Technology (KAIST), South Korea
Higher Educational Empowerment, Its Ideal Parameters and Their Corelation with Economy
Mohit Satoskar1and Anuprita Satoskar2, 1Ramrao Adik Institute of Technology, India and 2Mumbai University, India
Real Human Face Detection for Surveillance System Using Heterogeneous Sensors
Yoon-Ki Kim, Doo-Hyun Hwang and Chang-Sung Jeong, Korea University, South Korea
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment
Du-Hyun Hwang, Yoon-Ki Kim and Chang-Sung Jeong, Korea University, Republic of Korea
Robust Human Tracking Method Based on Apperance and Geometrical Features in Non-Overlapping Views
Binbin Liang1, Songchen Han1, Yan Zhu2, Liping Di1, 1Sichuan University, China and 2Nanjing University of Aeronautics and Astronautics, China
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Design
Yoshifumi Ukita, Yokohama College of Commerce, Japan