Reprint

Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)

Edited by
May 2021
234 pages
  • ISBN978-3-0365-0728-6 (Hardback)
  • ISBN978-3-0365-0729-3 (PDF)

This book is a reprint of the Special Issue Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019) that was published in

Chemistry & Materials Science
Engineering
Environmental & Earth Sciences
Summary
The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field.
Format
  • Hardback
License
© 2022 by the authors; CC BY-NC-ND license
Keywords
normalized cross-correlation; fast algorithm; first-order moment; systolic array; multiplication complexity; IoT; sustainability; hybrid RAM disk; direct byte read; secondary storage; operating system; PM2.5 concentration estimation; digital image processing; automatic region of interest selection; data exclusion; linear regression; census transform; sparse census transform; disparity; stereo vision; data hiding; multidimensional; embedding efficiency; mini-SuDoKu; security; NAND flash memory; P/E cycle; compression; adaptive ECC; RAID scattering; stripe log; parity; secret image sharing; maze matrix; cheat detection; cheater identification; controller area network; intrusion detection system; in-vehicle network security; machine learning; hierarchical approach; anomaly detection; MLHC; IWSNs; error models; IEEE 802.15.4; second-order Markov chain; OpenWSN; transmission reliability; IoT; certificateless signature; aggregate signature; arbitrated signature; public key replace attack; epidemic management; GNSS/GPS; infectious disease; isolation; social networking service; hot spot; adaptive data rate (ADR); transmit power control (TPC); time division multiple access (TDMA); wireless sensor network (WSN); power consumption; Internet of Things (IoT); n/a