|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
NetWare 2016 SENSORCOMM 2016 / SENSORDEVICES 2106 / SECURWARE 2016 /AFIN 2016 / DEPEND 2016 / CENICS 2016 / ICQNM 2016 / FASSI 2016 / GREEN 2016 / SMART ACCESSIBILITY 2016 Conference Venue Location
Sunday, July 24
Monday, July 25
Tuesday, July 26
Wednesday, July 27
Thursday, July 28
Friday, July 29
Program Details
AFIN 2016, The Eighth International Conference on Advances in Future Internet AFIN 1: Communication algorithms Node Movement Control Based on Swarm Intelligence for a Mobile Medium Ad hoc Network Podcast for Radio Studio of Zilina University
CENICS 2016, The Ninth International Conference on Advances in Circuits, Electronics and Micro-electronics CENICS 1: Design, models and languages Color Invariant Study for Background Subtraction A Hotspot Detection Method Based on Approximate String Search Improving the Performance of a SOM-Based FPGA-Placement-Algorithm Using SIMD-Hardware CENICS 2: Application-driven advances in additive manufacturing technologies I A Cost Model for SMARTLAM Novel Conductive Inks for 3D Printing Novel Nanoparticle Enhanced Digital Materials for 3D Printing and their Application Shown for the Robotic and Electronic Industry CENICS 3: Application-driven advances in additive manufacturing technologies II Requirements for 3D Printed Applications using Novel Nanoparticle Enhanced Digital Materials ADDMANU – An Austrian Lighthouse Project for Additive Manfacturing Novel FGMOS based Voltage Differencing Buffered Amplifier and its Filter Applications CENICS 4: Special circuits A High-Speed Programmable Network Intrusion Detection System Based on a Multi-Byte Transition NFA A Dynamically Reconfigurable NoC for Double-Precision Floating-Point FFT on FPGAs FS7 NSPO-built Spacecraft Power Control Unit Design [POSTER]
DEPEND 2016, The Ninth International Conference on Dependability DEPEND 1: Systems Integrating Security Consideration Into a Safety Case Construction Static Worst-Case Execution Time Analysis Tool Development for Embedded Systems Software Expurgated Codes for Detecting Jamming in Multi-level Memories Safe Transitions of Responsibility in Highly Automated Driving
FASSI 2016, The Second International Conference on Fundamentals and Advances in Software Systems Integration FASSI 1: Modeling and interacting FASSI Roadmap [PRESENTATION] (Inter)facing the Business Automated Infrastructure Management Systems - A Resource Model and RESTful Service Design Proposal to Support and Augment the Specifications of the ISO/IEC 18598/DIS Draft FASSI 2: Case-study solutions A Research Roadmap for Test Design in Automated Integration Testing of Vehicular Systems Case Study: Becoming a Medical Device Software Supplier A Specific Method for Software Reliability of Digital Controller in NPP
GREEN 2016, The First International Conference on Green Communications, Computing and Technologies GREEN 1: Green computing and communication technologies Enabling Green HeterogeneousWireless Networks Path Loss Analysis and Verification by Ray-Tracing for 3.5GHz Outdoor Environments Channel Measurement and Characteristics Analysis on 3.5GHz Outdoor Environment GREEN 2: Smart grid Indirect Demand Side Management Program Under Real-Time Pricing in Smart Grids Using Oligopoly Market Model Simulation of Electric Vehicle Battery Behaviour for Frequency Regulation Use: Profitability Versus Mobility Constraints and Grid Needs Outsourcing Electric Vehicle Smart Charging on the Web of Data GREEN 3: Energy awareness Hypergraph of Massive Digital Traces as Representation of Human Activities: A Way to Reduce Energy Consumption by Identifying Sustainable Practices SWIM: Social Welfare Maximizing Incentive Mechanism for Smart Meter Data Aggregation Channel Allocation Plan for DAB and DRM+ Systems in VHF Band III
ICQNM 2016, The Tenth International Conference on Quantum, Nano/Bio, and Micro Technologies ICQNM 1: Systems and materials Population Inversion by an Adiabatic Cycle in 1D Boson System Reduction of Silver Oxide Film in Inert Gas Plasma Quantum Hexagonal Quadrature Amplitude Modulation The Formation of Black Glasses from Ladder-like Silsequioxanes
SECURWARE 2016, The Tenth International Conference on Emerging Security Information, Systems and Technologies SECURWARE 1: Security challenges with new technologies A Generic Feature-based Detection for Facebook Spamming Groups Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication Cost-Effective Biometric Authentication using Leap Motion and IoT Devices Node Compromise Detection Based on Parameter Grouping in Wireless Sensor Networks SECURWARE 2: Security technologies Embedded Security Testing with Peripheral Device Caching and Runtime Program State Approximation The Principle of 3D Sensors A Secure Frequency Hiding Index for Encrypted Databases SECURWARE 3: Applied security technologies and systems I Analysis of Direct Punch in Professional Defence Using Multiple Methods Methodology of the Determination of the Uncertainties by Using the Biometric Device the iCAM 7000 Scanning Probe Microscopy Used for 3D Topography Image Acquisition of Marks on Cartidge Cases in Forensic Ballistics Security of Seniors – The Detection and Prevention of Falls SECURWARE 4: Applied security technologies and systems II Improvement of CPRNG of the PM-DC-LM Mode and Comparison with its Previous Version Severity Assessment of Security Incidents Methodology of Future Security Studies Measurement of Electromagnetic Interference of Electronic Devices SECURWARE 5: Applied security technologies and systems III Object Oriented Role-Based Access Control Introduction to Web Security and Evaluation Methods of Web Application Vulnerabilities Electromagnetic Weapons as Means of Stopping Vehicles An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers SECURWARE 6: Applied security technologies and systems IV The Mathematical Modeling of Road Transport in Context of Critical Infrastructure Protection Linkages Types with an Emphasis on Important Critical Infrastructure Sectors Security and Safety Processes in Czech Republic Universities Comprehensive System of Intense Convective Precipitation Forecasts for Regional Crisis Management SECURWARE 7: Applied security technologies and systems V Insight into Contemporary Dissemination Techniques of Mobile Botnet Clients (Bots) Innovation Standard Methods of Evaluating the Results of Shooting The Possibilities of the Search Engine Shodan in Relation to SCADA The Configuration of Alarm Systems during the Measurement of Electromagnetic Interference SECURWARE 8: Applied security technologies and systems VI Comparison of Security Devices in Terms of Interception Theoretical Sources for a Theory of Safety and Security Comparison of Various Encryption Techniques Based on Deterministic Chaos Using Ethical Hacking to Analyze BYOD Safety in Corporations SECURWARE 9: Applied security technologies and systems VII Critical Infrastructure Protection – Modeling of Domino and Synergy Effects Towards Extensible Signature Policies in Brazil: A Case Study Information Support System Development in Relation to Critical Infrastructure Element Resilience Evaluation Strengthening Software Diversity Through Targeted Diversification SECURWARE 10: Applied security technologies and systems VIII Education System in Commercial Security Possibilities of Technical Security of Elementary Schools Resistance of Passive Security Elements as A Quantitative Parameter Influencing The Overall Resistance and Resilience of A Critical Infrastructure Element Electromagnetic Compatibility and Power-Line Quality SECURWARE 11: Applied security technologies and systems IX Interception Methods and GSM Preliminary Study of Shielding of 802.11ah Authentication of Czech Banknotes using Raman Microscopy SECURWARE 12: Cryptography An Efficient Pseudo Chaotic Number Generator Based on Coupling and Multiplexing Techniques A Novel Verifiable Multi-Secret Sharing Scheme Based on Elliptic Curve Cryptography An Improved ID-based Proxy Signature Scheme Based on Elliptic Curve Cryptography Selective Hybrid Chaotic-Based Cipher for Real-Time Image Application Seven Steps to a Quantum-Resistant Cipher SECURWARE 13: Security management Reflecting on the Use of Sonification for Network Monitoring LoT: a Reputation-based Trust System for Long-term Archiving Security and Safety Requirements for Soft Targets in Czech Republic General Model for Personal Data Sensitivity Determination SECURWARE 14: Risk and security A Study on User Perceptions of ICT Security Visualization of Privacy Risks in Software Systems Information Security Maturity as an Integral Part of ISMS based Risk Management Tools Modeling Vulnerable Internet of Things on SHODAN and CENSYS : An Ontology for Cyber Security SECURWARE 15: Security frameworks, architectures and protocols Energy-aware Security Adaptation in Ubiquitous Mobile Network Security Update and Incident Handling for IoT-devices; A Privacy-Aware Approach Attacker-Parametrised Attack Graphs Study on Dual Data Structure in Enterprise Information Security Architecture
SENSORCOMM 2016, The Tenth International Conference on Sensor Technologies and Applications SENSORCOMM 1: Architectures, protocols and algorithms of sensor networks VANETs Networking Protocols: An Analytical Study A Low-Power, Tricky and Very Easy to Use Sensor Network Gateway Architecture with Application Example IoT-based Wireless Access Point for Underground Safety Services Improved Lossless Compression Algorithm in HEVC SENSORCOMM 2: Special sensor circuits and sensor devices Field Study of Ice Detection on Structures Using Passive Thermal Infrared Imaging Ice Detection Experimentation Setup Using Infrared and Active Heating Using AD5933 IC to Measure Dielectric Constant Variation of Atmospheric Ice SENSORCOMM 3: Software, monitoring, and information in sensor networks I A Framework for Connectivity Monitoring in Wireless Sensor Networks A New Formalisation for Wireless Sensor Network Adaptive Context-aware System: Application to an Environmental Use Case Quality of Service and Energy Efficient Evaluation of Hierarchical and Flat Routing Protocols for Wireless Sensor Networks A Preventing Schema to Determinate Structural Damage in Buildings Caused by Earthquakes Using a Platform Based in Wireless Sensor Networks SENSORCOMM 4: Software, monitoring, and information in sensor networks II Smart Services Through Smart Item Agent Intelligent Shopping Trolley (IST) System by WSN to Support Hypermarket IoT Service Time Synchronization on Android Devices for Mobile Construction Assessment
SENSORDEVICES 2016, The Seventh International Conference on Sensor Device Technologies and Applications SENSORDEVICES 1: Gas sensors Colorimetric Sensor Array based on Ink-jet Printing Method for Gas Detection System Identification and Discrimination of Herbicide Residues Using a Conducting Polymer Electronic Nose Mobile Sensor System for Alcohol Control and Numerical Signal Analysis SENSORDEVICES 2: Ultrasonic and piezosensors Surface Acoustic Wave Sensors for Fine Particle Detection Gasoline Sensor Based on Piezoelectric Lateral Electric Field Resonator Coating Process for MEMS Based 3-axis Force Sensors Influence of Structure Configuration on Strained Devices: A Piezoelectric-oriented Survey SENSORDEVICES 3: Sensor devices I PLD as Possible Tool for the Fabrication of Chemosensors Based on Amorphous Membranes Capillary Sensor with Fluorescence Reading of Effects of Diesel and Biodiesel Fuel Degradation in Storage Development of Methanol Sensors: Carbon Nanotubes Blended Hydroxyapatite Nano-Ceramics Multienzyme Electrochemical Array Sensor for Determination of Phenols in the River with SIA Method [PRESENTATION] SENSORDEVICES 4: Sensor devices II Development of a Mechanical Sleeve Diagnosis Test Measurement of Water in Oil for Active Bearing Performance Monitoring Using Optical Fiber Sensor System Development of Integrated Laser Triangulation Sensor and the Processing Algorithm of Light Spot [PRESENTATION] SENSORDEVICES 5: Sensor devices III SAW Based Phononic Crystal Liquid Sensor with Integrated Periodic Microfluidic Channels High Speed Magneto–Optical Sensor for Magnetic Stripe Readout Progress in Design and Fabrication of Resonator Quantum Well Infrared Photodetectors (R-QWIP) SENSORDEVICES 6: Medical devices and sensors applications A Device for Self-monitoring Breath Analysis SAT406M. Physiological Status Determination of a Wrist-Worn Personal Locator Beacon User: Preliminary Results Rehabilitation Robot Based on Three-axis Force/Torque Sensor Combination of Isothermal DNA Amplification and Photonic Resonator Method for Detection of Cancer Biomarker [POSTER] SENSORDEVICES 7: Sensor device technologies White Light Interferometry: Correlogram Correlation for Surface Height Gauging Crude Oil Detection using CMOS Image Sensor and UV LED Response Time Investigation Based on GaAs Position Sensitive Detector Electrochemical Immunosensor Based on Dielectrophoretically Assembled Graphene and Gold Nanoparticles for Sensitive Detection of Listeria Monocytegenes [PRESENTATION]
SMART ACCESSIBILITY 2016, The First International Conference on Universal Accessibility in the Internet of Things and Smart Environments SMART ACCESSIBILITY 1: Ambient accessibility New Controlling Technique between Smart Devices Using Inaudible Frequency in Noise Environment A Review of Universal Design in Ambient Intelligence Environments Accessible Control of Distributed Devices - Supporting Persons with Disabilities by Providing Adaptive Interaction |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2016, IARIA