Journal title
ISSN: 1999-5903    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 10 Part 8 Year 2018

14 articles in this issue 

Fabio Viola, Luca Roffia, Francesco Antoniazzi, Alfredo D’Elia, Cristiano Aguzzi and Tullio Salmon Cinotti

This article presents Tarsier, a tool for the interactive 3D visualization of RDF graphs. Tarsier is mainly intended to support teachers introducing students to Semantic Web data representation formalisms and developers in the debugging of applications ba... see more

Pags. 0 - 0  

Lei Zhang and Xiaoli Zhi

Convolutional neural networks (CNN for short) have made great progress in face detection. They mostly take computation intensive networks as the backbone in order to obtain high precision, and they cannot get a good detection speed without the support of ... see more

Pags. 0 - 0  

Chuanxiang Ren, Wenbo Zhang, Lingqiao Qin and Bo Sun

To alleviate the queue spillovers at intersections of urban roads during rush hours, a solution to the cross-spill problem based on vehicle networking technologies is proposed. This involves using connected vehicle technology, to realize the interactive i... see more

Pags. 0 - 0  

Nisrine Ibadah, Khalid Minaoui, Mohammed Rziza, Mohammed Oumsis and César Benavente-Peces

Mobility trace techniques makes possible drawing the behaviors of real-life movement which shape wireless networks mobility whereabouts. In our investigation, several trace mobility models have been collected after the devices’ deployment. The main issue ... see more

Pags. 0 - 0  

Yi-Ting Huang and Sheng-Fang Su

Instagram is currently the most popular social media app among young people around the world. More than 70% of people between the ages of 12 and 24 are Instagram users. The research framework of this study was constructed based on smartphone addiction and... see more

Pags. 0 - 0  

Marcio Andrey Teixeira, Tara Salman, Maede Zolanvari, Raj Jain, Nader Meskin and Mohammed Samaka

This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank’s control system, which is a stage in the process of water treatment and... see more

Pags. 0 - 0  

Jianqiang Liu, Shuai Huo and Yi Wang

Overloading of IP address semantics appeals for a new network architecture based on Identifier (ID)/Locator separation. The challenge of Identifier (ID)/Locator separation is how to solve the scalability and efficiency challenges of identity-to-location r... see more

Pags. 0 - 0  

Kanghuai Liu, Zhigang Chen, Jia Wu, Yutong Xiao and Heng Zhang

In the social scene of opportunistic networks, message applications find suitable relay nodes or certain transmission destinations from the surrounding neighbors through specific network addresses of users. However, at the dawn of big data and 5G networks... see more

Pags. 0 - 0  

Jianjun Lei, Jiarui Tao and Shanshan Yang

Regarding access point (AP) overload and performance anomaly which is caused by mobile terminals with different bitrates, a joint AP association and bandwidth allocation optimization algorithm is presented in this paper. Meanwhile, load balancing and prop... see more

Pags. 0 - 0  

Ludger Goeke, Nazila Gol Mohammadi and Maritta Heisel

Cloud computing services bring new capabilities for hosting and offering complex collaborative business operations. However, these advances might bring undesirable side-effects, e.g., introducing new vulnerabilities and threats caused by collaboration and... see more

Pags. 0 - 0  

Shardrom Johnson, Jinwu Han, Yuanchen Liu, Li Chen and Xinlin Wu

Sampling inspection uses the sample characteristics to estimate that of the population, and it is an important method to describe the population, which has the features of low cost, strong applicability and high scientificity. This paper aims at the sampl... see more

Pags. 0 - 0  

Lijun Zhang, Kai Liu and Jian Liu

Researchers from different disciplines, such as materials science, computer science, safety science, mechanical engineering and controlling engineering, have aimed to improve the quality of manufacturing engineering processes. Considering the requirements... see more

Pags. 0 - 0  

Jinyi Guo, Wei Ren, Yi Ren and Tianqing Zhu

When large images are used for big data analysis, they impose new challenges in protecting image privacy. For example, a geographic image may consist of several sensitive areas or layers. When it is uploaded into servers, the image will be accessed by div... see more

Pags. 0 - 0