![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
ICIIT 2019: Da Nang, Vietnam
- Proceedings of the 2019 4th International Conference on Intelligent Information Technology, ICIIT '19, Da Nang, Vietnam, February 20-23, 2019. ACM 2019, ISBN 978-1-4503-6633-5
Graphic Image and Signal Processing
- Trung-Thanh Ngo, Dong-Seong Kim:
Intelligent Vision System for Multi-rotor UAVs in SAR Operation. 1-4 - Christopher John R. Llanda:
Video Tutoring System with Automatic Facial Expression Recognition: An Enhancing Approach to E-Learning Environment. 5-9 - Tran Thi Hai Uyen, Seungcheol Choi, Oh-Jin Kwon:
Subjective Evaluation of the 360-Degree Projection Formats Using Absolute Category Rating. 10-15 - Normi Abdul Hadi, Norma Alias:
3-Dimensional Human Head Reconstruction Using Cubic Spline Surface on CPU-GPU Platform. 16-20 - Kwang-Ki Kim, Kiho Kim, Jinsul Kim:
A Study on Realistic Audio Sound Generation according to User's Movement in Virtual Reality System. 21-25 - Ikram Hussain, Oh-Jin Kwon, Seungcheol Choi:
An Evaluation of Three Representative 360-Degree Image Projection Formats in Terms of JPEG2000 Coding Efficiency. 26-31
Network Technology and Information Security
- Gibeom Song, Seungsoo Park, Man-Hee Lee:
Using Emulab for Deep Learning Performance Comparisons among Network Topologies. 32-36 - Nitirat Tanthavech, Apichaya Nimkoompai:
CAPTCHA: Impact of Website Security on User Experience. 37-41 - Jung-Sook Kim, Junho Jeong
, Tae-Sub Chung:
Development of the IoT- Based Remote Monitoring System of Sleeping Hours. 42-45 - Ara Hur, Jooeun Kim, Yeonseung Ryu:
Hiding Vulnerabilities of Internet of Things Software Using Anti-Tamper Technique. 46-50
Computer Theory and Technology
- Mohana Sundar, Ashraf Ahmed, Joung-Hu Park:
Discrete-Time Modelling and Bifurcation Analysis for Finite-Control-Set Model-Predictive-Controlled Power Converter with Unity Horizon Length. 51-56 - Amy P. Balcita
, Stephan Kupsch, Thelma D. Palaoag
:
KITIKIT: A Mobile App for Searching Hand-carved Wood Products. 57-61 - Xiao Liu, Gyun Woo:
YapuresPlus: An Optimized Efficient Framework to Guarantee Safety of JavaScript. 62-66 - Gul Munir Ujjan, Abdul Malik, Shakil Ahmed, Mohd Zaid Abdullah:
Implementation of 4-Bit Data Transmission for Accessing SD Card with FPGA Embedded Soft Processor. 67-72
Data Science and Big Data Technology
- Jae-Kyeong Sim, Hyungtai Kim, Geon Ha Kim
, Mun-Taek Choi
:
Supervised Classification of Geriatric Anxiety. 73-77 - Haijun Zhao, Bang Zhao, Susu Cheng:
The Mechanism of Confirming Big Data Property Rights Based on Smart Contract. 78-82 - Nghia Duong-Trung
, Luyl-Da Quach
, Minh-Hoang Nguyen, Chi-Ngon Nguyen
:
A Combination of Transfer Learning and Deep Learning for Medicinal Plant Classification. 83-90 - Yuanhu Gu
, Thelma Domingo Palaoag
:
Designing a Dependency Execution for Oracle Jobs. 91-95 - Sung-Hwan Son, Hyun-Young Lee, Gyu-Hyeon Nam, Seung-Shik Kang:
Korean Song-lyrics Generation by Deep Learning. 96-100 - Tu Cam Thi Tran, Hiep Xuan Huynh, Phuc Quang Tran
, Quoc Dinh Truong:
Text Classification Based on Keywords with Different Thresholds. 101-106 - Bangbo Yu, Haijun Zhao:
Research on the Construction of Big Data Trading Platform in China. 107-112 - Gyu-Hyeon Nam, Hyun-Young Lee, Seung-Shik Kang:
Korean Dependency Parsing with Proper Noun Encodin. 113-117
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.