{"title":"Local Descriptor and Feature Selection Based Palmprint Recognition System","authors":"C. Taouche, H. Belhadef","doi":"10.1007/978-3-030-33582-3_72","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_72","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CarbonFree - A Multi-platform Application for Low Carbon Education","authors":"H. Hui, Noraini Ibrahim, F. A. Phang","doi":"10.1007/978-3-030-33582-3_108","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_108","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122977612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Storage Management Method for Video-on-Demand Server","authors":"O. A. Al-wesabi, Nibras Abdullah, P. Sumari","doi":"10.1007/978-3-030-33582-3_65","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_65","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123235903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of SRAM PUF Characteristics and Generation of Stable Bits for IoT Security","authors":"Pyi Phyo Aung, K. Mashiko, N. Ismail, C. Y. Ooi","doi":"10.1007/978-3-030-33582-3_42","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_42","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128599411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raed Al-Dhubhani, Jonathan M. Cazalas, Rashid Mehmood, Iyad A. Katib, Faisal Saeed
{"title":"A Framework for Preserving Location Privacy for Continuous Queries","authors":"Raed Al-Dhubhani, Jonathan M. Cazalas, Rashid Mehmood, Iyad A. Katib, Faisal Saeed","doi":"10.1007/978-3-030-33582-3_77","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_77","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116174578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Word Embedding-Based Biomedical Text Summarization","authors":"Oussama Rouane, H. Belhadef, M. Bouakkaz","doi":"10.1007/978-3-030-33582-3_28","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_28","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121558682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulaziz Aborujilah, R. Nassr, Tawfik Al Hadhrami, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othmani, Nur Syahela, H. Ochiai
{"title":"Security Assessment Model to Analysis DOS Attacks in WSN","authors":"Abdulaziz Aborujilah, R. Nassr, Tawfik Al Hadhrami, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othmani, Nur Syahela, H. Ochiai","doi":"10.1007/978-3-030-33582-3_74","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_74","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121684749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Missing Data Characteristics and the Choice of Imputation Technique: An Empirical Study","authors":"O. A. Alade, R. Sallehuddin, N. Radzi, A. Selamat","doi":"10.1007/978-3-030-33582-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_9","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"88 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eu Lay Tien, N. M. Ali, S. Miskon, Norasnita Ahmad, N. S. Abdullah
{"title":"Big Data Analytics Adoption Model for Malaysian SMEs","authors":"Eu Lay Tien, N. M. Ali, S. Miskon, Norasnita Ahmad, N. S. Abdullah","doi":"10.1007/978-3-030-33582-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_5","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132353577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Annotation of Scientific Publications Based on Integration of Concept Knowledge","authors":"S. S. Phyo, Nyein Nyein Myo","doi":"10.1007/978-3-030-33582-3_10","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_10","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133928340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}