LEADER 05308nam 22006375 450 001 9910349283103321 005 20230907192941.0 010 $a3-030-30149-4 024 7 $a10.1007/978-3-030-30149-1 035 $a(CKB)4100000009191115 035 $a(DE-He213)978-3-030-30149-1 035 $a(MiAaPQ)EBC5921378 035 $a(PPN)260306568 035 $a(EXLCZ)994100000009191115 100 $a20190816d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIndustrial Networks and Intelligent Systems $e5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedings /$fedited by Trung Quang Duong, Nguyen-Son Vo, Loi K. Nguyen, Quoc-Tuan Vien, Van-Dinh Nguyen 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XVII, 314 p. 245 illus., 98 illus. in color.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v293 311 $a3-030-30148-6 327 $aOutage Analysis of MIMO-NOMA Relay System with User Clustering and Beamforming under Imperfect CSI in Nakagami-m Fading Channels -- User-pairing scheme in NOMA systems: A PSO-based approach -- Resource Sharing and Segment Allocation Optimized Video Streaming over Multi-hop Multi-path in Dense D2D 5G Networks -- QoE-aware Video streaming over HTTP and SDN -- An Optimal Power Allocation for D2D Communications Over Multi-User Cellular Uplink Channels -- Secrecy Performance Enhancement Using Path Selection Over Cluster-Based Cognitive Radio Networks -- Physical Layer Secrecy Enhancement for Non-Orthogonal Multiple Access Cooperative Network with Artificial Noise -- Performance Analysis of Software Defined Network -- Concepts in Networked Embedded Systems -- System performance of relay-assisted heterogeneous vehicular networks with unreliable backhaul over double-Rayleigh fading channels -- On Secure Non-Orthogonal Multiple Access Relaying Network with RF Power Transfer -- A data-driven approach for Network Intrusion Detection and Monitoring based on Kernel Null Space -- Social Coalition-Aware Task Assignment in Flying Internet of Things -- Ontology-Based Semantic Search for National Database of Natural Resources and Environment -- Optimized Multi-Cascade Fuzzy Model for Ship Dynamic Positioning System Based on Genetic Algorithm -- UiTiOt-Vlab: A Low Cost Physical IoTs Testbed Based on Over-The-Air Programming Approach -- Performance Analysis on Wireless Power Transfer Wireless Sensor Network with Best AF Relay Selection over Nakagami-m Fading -- Hardware and Software Design, Information Processing and Data Analysis -- Generating Test Data for Blackbox Testing from UWE -- Linearizing RF Power Amplifiers Using Adaptive RPEM Algorithm -- LBP-based edge information for color texture classification -- A Vietnamese Sentiment Analysis System Based On Multiple Classifiers With Enhancing Lexicon Features -- A Security Proof Of The GLP Signature Scheme Toward a trust-based authentication framework of Northbound interface in Software Defined Networking -- Detecting Signalling DoS Attacks on LTE Networks -- Anomaly Detection Using One-Class SVM for Logs of Juniper Router Devices. 330 $aThis book constitutes the refereed proceedings of the 5th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2019, held in Ho Chi Minh City, Vietnam, in August 2019. The 25 full papers were selected from 39 submissions and are organized thematically in tracks on telecommunications systems and networks; industrial networks and applications; hardware and software design and development; information processing and data analysis; signal processing; security and privacy. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v293 606 $aComputer networks 606 $aArtificial intelligence 606 $aData protection 606 $aComputer science$xMathematics 606 $aComputer Communication Networks 606 $aArtificial Intelligence 606 $aData and Information Security 606 $aMathematics of Computing 615 0$aComputer networks. 615 0$aArtificial intelligence. 615 0$aData protection. 615 0$aComputer science$xMathematics. 615 14$aComputer Communication Networks. 615 24$aArtificial Intelligence. 615 24$aData and Information Security. 615 24$aMathematics of Computing. 676 $a004.6 676 $a004.6 702 $aDuong$b Trung Quang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVo$b Nguyen-Son$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNguyen$b Loi K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVien$b Quoc-Tuan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNguyen$b Van-Dinh$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910349283103321 996 $aIndustrial Networks and Intelligent Systems$92884198 997 $aUNINA