2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)

14-16 Sept. 2016

Filter Results

Displaying Results 1 - 25 of 61
  • [Front cover]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (330 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):iii - viii
    Request permission for commercial reuse | PDF file iconPDF (482 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2016, Page(s):263 - 265
    Request permission for commercial reuse | PDF file iconPDF (1049 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Co-organizers

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Proceedings

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1065 KB)
    Freely Available from IEEE
  • Message from the NICS 2016 general chairs

    Publication Year: 2016, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (241 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (216 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2016, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Executive committee

    Publication Year: 2016, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Technical program committee

    Publication Year: 2016, Page(s):xii - xvi
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Keynote talk #1: 5G: From MIMO to massive MIMO

    Publication Year: 2016, Page(s):xviii - xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Multiple-input multiple-output (MIMO) communications systems have been seriously considered in recent years to achieve substantial gains in spectral, power, and energy efficiency compared to conventional single-input single-output (SISO) systems. Various MIMO configurations based on Single-User (SU)-MIMO, Multi-User (MU)-MIMO, network-MIMO architectures have been proposed for LTE systems. To accom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote talk #2: Health informatics: A step forward to design an intelligent system for monitoring personal healthcare

    Publication Year: 2016, Page(s):xx - xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    In recent years, the growing demand of personal healthcare has attracted much attention from both researchers and practitioners. The motivation of designing an efficient intelligent system that keeps track physical conditions, makes diagnosis based on the symptoms, and recommends appropriate treatments is the long-term objective in Health Informatics. In this talk, we will present our recent resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 2016, Page(s): 268
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Papers by title

    Publication Year: 2016, Page(s):266 - 267
    Request permission for commercial reuse | PDF file iconPDF (1167 KB)
    Freely Available from IEEE
  • On the performance of wireless energy harvesting TAS/MRC relaying networks over Nakagami-m fading channels

    Publication Year: 2016, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Performance of dual-hop decode-and-forward (DF) relaying networks employing a limited-energy relay antenna with transmit antenna selection (TAS) for the first hop and maximal ratio combining (MRC) for the second hop is studied. Specifically, a closed-form expression for the system outage probability over uncorrelated Nakagami-m fading channels is derived. Detailed simulation results are given. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure distributed switch-and-stay combining networks: Secure outage probability analysis

    Publication Year: 2016, Page(s):101 - 106
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    In this paper, we derive the secure outage probability for secure distributed switch-and-stay combining (DSSC) networks over Rayleigh fading channels. Monte Carlo simulations are performed to verify the analysis and to confirm the secure advantage of the proposed DSSC networks over secure direct transmission and secure incremental relay networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secrecy performance analysis of energy harvesting wireless networks with multiple power transfer stations and destinations in the presence of multiple eavesdroppers

    Publication Year: 2016, Page(s):107 - 112
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Nowadays, physical layer secrecy has become the new approach to enhance information security of wireless networks and have attracted the attention of lot of researchers in the world. This paper investigates the physical layer secrecy performance of radio frequency energy harvesting (RF-EH) networks over Rayleigh fading channels. The considered RF-EH system consists of multiple power transfer stati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of hardware impairments on secrecy performance of multi-hop relay networks in presence of multiple eavesdroppers

    Publication Year: 2016, Page(s):113 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (907 KB) | HTML iconHTML

    This paper investigates impact of hardware impairments on the probability of Non-zero Secrecy Capacity (NSC) of multi-hop relay networks. In the considered protocol, multiple eavesdroppers attempt to overhear the data that is relayed from a source to a destination via multiple intermediate relay nodes. To enhance the secrecy performance, the multi-hop randomize-and-forward (RF) strategy is used to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intuitionistic linguistic label: An equivalent form of intuitionistic linguistic number

    Publication Year: 2016, Page(s):119 - 124
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    Intuitionistic linguistic labels (ILLs) as well as intuitionistic linguistic numbers (ILNs), which play some first efforts to deal with intuitionistic linguistic information, were independently developed in recent years. Several aggregation operators for ILNs were proposed. In this paper, arithmetic averaging, weighted arithmetic averaging, ordered weighted averaging and hybrid aggregation operato... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A wireless sensor network solution for monitoring water quality in Botswana

    Publication Year: 2016, Page(s):12 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (479 KB) | HTML iconHTML

    Wireless Sensor Networks (WSNs) provide reliable and affordable infrastructure for various applications ranging from environmental monitoring, industrial automation, telemedicine, to military surveillance. These networks allow monitoring processes to be conducted remotely, in real-time and with minimal human intervention. Water quality monitoring is essential to the provision of clean and safe wat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement methods for stock market prediction using financial news articles

    Publication Year: 2016, Page(s):125 - 129
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    News articles serve the purpose of spreading company's information to the investors either consciously or unconsciously in their trading strategies on the stock market. Because of the immense growth of the internet in the last decade, the amount of financial articles have experienced a significant growth. It is important to analyze the information as fast as possible so they can support the invest... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an argument-based method for answering why-question in Vietnamese language

    Publication Year: 2016, Page(s):130 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    In this paper, an argument-based method of answering why-questions in Vietnamese is presented. This method is developed in different way from many approaches which use cue phrases of causal relation to find the answers for why-questions. In this method, the arguments is extracted firstly, then the causal part and consequential part of every argument are split in order to index the consequential pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering web video search results with convolutional neural networks

    Publication Year: 2016, Page(s):135 - 140
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    Convolutional Neural Networks (CNNs) have been established as a powerful class of models for image recognition problems giving state-of-the-art results on recognition, detection, segmentation, classification and retrieval. Encouraged by these results, we develop our previous work [14] by implementing deep neural network architecture for extracting and representing visual features to improve the cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.