


default search action
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: Guangzhou, China
- Guojun Wang, Qi Han, Md. Zakirul Alam Bhuiyan, Xiaoxing Ma, Frédéric Loulergue, Peng Li, Manuel Roveri, Lei Chen:
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018. IEEE 2018, ISBN 978-1-5386-9380-3
4th IEEE Smart World Congress (SmartWorld 2018)
Track 1: Smart World Theories and Models (SWTM)
- Lichen Zhang:
Modeling Smart Cyber Physical Systems Based on ModelicaML. 1-8 - Hussain Al-Aqrabi
, Richard Hill
:
A Secure Connectivity Model for Internet of Things Analytics Service Delivery. 9-16 - Hussain Al-Aqrabi
, Richard Hill
:
A Scalable Model for Secure Multiparty Authentication. 17-22 - Mingming Wang, Li Wang, Xinyue Xu
, Yong Qin:
Characteristics Analysis and Impact Cluster on Urban Rail Transit Perturbations: A Real Case in Beijing. 23-28
Track 2: Smart World Technologies (SWT)
- Jing Li, Hao Peng
, Lin Liu, Guixi Xiong, Bowen Du, Hongyuan Ma, Lihong Wang, Md. Zakirul Alam Bhuiyan:
Graph CNNs for Urban Traffic Passenger Flows Prediction. 29-36 - Ashutosh Shivakumar, Miteshkumar Vasoya, Sean Morrison, Yong Pei:
Individualized Smart Charging to Mitigate the Growing Electrical Peak Demand from EVs as Home Appliances. 37-44 - Jiasong Zhu, Weidong Lin, Ke Sun, Xianxu Hou, Bozhi Liu, Guoping Qiu
:
Behavior Recognition of Moving Objects Using Deep Neural Networks. 45-52 - Syed Muhammad Asim Ali Rizvi
, Weifeng Lv, Bowen Du, Zhipu Xie, Runhe Huang:
Optimization of Bus Lines Based on Passenger Group Moving Behaviors. 53-60
Work-in-Progress Papers (WiP)
- Junwei Zhang, Jiaxiang Ou, Chao Ding, Wenbin Shi:
An Abnormal Behavior Detection Based on Deep Learning. 61-65 - Damien Hanyurwimfura
, Eric Nizeyimana
, Faustine Ndikumana
, Didacienne Mukanyiligira
, Abubakar Bakar Diwani, Florence Mukamanzi:
Monitoring System to Strive against Fall Armyworm in Crops Case Study: Maize in Rwanda. 66-71 - Monisha Bhattacharya, Dhruva Gupta, Shantanu Biswas, Gunjan Bansal:
Designing Recommender System for Corporate Education WiP+32. 72-76 - Ho-Jin Heo, Namgi Kim, Byoung-Dai Lee:
Multicast Tree Generation Technique Using Reinforcement Learning in SDN Environments. 77-81 - Stephanie Haynes, Paul Wooderson
:
Smart Vehicles: The Data Privacy Smog. 82-87 - Christopher Prentice, Georgios Karakonstantis:
Smart Office System with Face Detection at the Edge. 88-93
2018 International Workshop on Assistive Engineering and Information Technology (AEIT 2018)
Regular Papers
- Hongyu Wang, Ping Zhu
, Xueqiang Zou, Su-Juan Qin:
An Ensemble Learning Framework for Credit Card Fraud Detection Based on Training Set Partitioning and Clustering. 94-98 - Zhenghui Liu, Bin Wang, Changjun Zhou, Xiaopeng Wei, Qiang Zhang
, Zhixiang Yin, Xianwen Fang, Zhonglong Zheng:
An Improved Iterated Hybrid Search for DNA Codes Design. 99-105 - Wenjun Yang, Shuzhen Fan, Huaibin Wang:
An Item-Diversity-Based Collaborative Filtering Algorithm to Improve the Accuracy of Recommender System. 106-110 - Gang Ma, Wenliang Zhu, Jun Zhong, Teng Tong, Jie Zhang, Lirong Wang:
Wearable Ear Blood Oxygen Saturation and Pulse Measurement System Based on PPG. 111-116 - Miao Zhang, Cong Wang, Meng Gan, Na Yang, Ting Yang, Lirong Wang:
Automated Segmentation of Esophagus Layers from OCT Images Using Fast Marching Method. 117-122 - Kongpeng Xing, Jun Zhong, Wenliang Zhu, Gang Ma, Teng Tong, Lirong Wang:
A Wearable High-Precision Skin Resistance Acquisition System. 123-127 - Jie Zhang, Wenliang Zhu, Gang Ma, Teng Tong, Jun Zhong, Lirong Wang:
Design of a Portable Physiological Signal Data Storage System. 128-132 - Teng Tong, Lishen Qiu, Jun Zhong, Chongsen Zang, Bin Chen, Lirong Wang:
Wearable Arteriovenous Fistula Murmur Monitoring System Based on Embedded Wi-Fi Technology. 133-138 - Lishen Qiu, Wanyue Li, Wenqiang Cai, Miao Zhang, Wenliang Zhu, Lirong Wang:
Heartbeat Classification Using Convolution Neural Network and Wavelet Transform to Extract Features. 139-143 - Longfei Niu, Wenliang Zhu, Lirong Wang:
Design of Remote Database Service System for Wearable Devices. 144-149 - Lei Shi:
Model-Based Active Impedance Controller Development of the Exoskeleton Rehabilitation Robot (ERRobot) for Lower-Extremity. 150-155 - Haicheng Chi, Zhen Liu:
Maximum Frequent Itemsets Discovery Algorithm Based on Granular Computing. 156-161
2018 Special Session on Advanced Information Systems Engineering (AISE 2018)
Regular Papers
- Zhenzhen Wang:
A Naïve Construction Model of Membership Function. 162-167 - Hongbiao Gao, Jianbin Li, Jingde Cheng:
Measuring Interestingness of Theorems in Automated Theorem Finding by Forward Reasoning: A Case Study in Tarski's Geometry. 168-173 - Yohei Kamata, Yuichi Goto
:
Improvement of Data Portability of ENQUETE-BAISE: A General-Purpose E-Questionnaire Server for Ubiquitous Questionnaire. 174-179 - Takumi Otsuka, Kentaro Fukushi, Yuichi Goto
, Jingde Cheng:
FreeEnCal Web: A Web Service of Automated Forward Reasoning for General-Purpose. 180-185 - Tomoya Yamazaki, Atomu Sakuma, Yuichi Goto
:
An Implementation of Theory Grid with Linked Data Technologies. 186-191 - Sho Ishibashi, Jingchen Yan, Yuichi Goto
, Jingde Cheng:
Primitive Constituent Elements of Cryptographic Protocols. 192-197 - Yuan Zhou
, Daisuke Matsuura, Yuichi Goto
, Jingde Cheng:
Evaluation about the Descriptive Power of QSL: A Specification Language for E-Questionnaire, E-Testing, and E-Voting Systems. 198-203 - Da Bao, Wen Sun, Yuichi Goto
, Jingde Cheng:
Development of Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045. 204-209 - Jingchen Yan, Sho Ishibashi, Yuichi Goto
, Jingde Cheng:
A Study on Fine-Grained Security Properties of Cryptographic Protocols for Formal Analysis Method with Reasoning. 210-215 - Jun Cao, Zhong Fan:
Deep Learning-Based Online Small Signal Stability Assessment of Power Systems with Renewable Generation. 216-221 - Yuichi Goto
, Takuya Ito:
An Epistemic Programming Approach for Automated Nonmonotonic Reasoning Based on Default Logic. 222-227 - Yanhong Liu, Hui Lv, Changjun Zhou, Zhixiang Yin, Xianwen Fang, Zhonglong Zheng, Qiang Zhang
:
Stability Analysis and Hopf Bifurcation Research for DNA Strand Displacement with Time Delay. 228-233 - Jingde Cheng, Runhe Huang, Qun Jin, Jianhua Ma, Yi Pan
:
An Undergraduate Curriculum Model for Intelligence Science and Technology. 234-239 - Haibo Yu, Xi Jia, Tsunenori Mine, Jianjun Zhao:
Type Conversion Sequence Recommendation Based on Semantic Web Technology. 240-245
2018 Special Session on Blockchain and Its Applications (BlockChain 2018)
Regular Papers
- Mark Hanley, Hitesh Tewari
:
Managing Lifetime Healthcare Data on the Blockchain. 246-251 - Zijian Bao, Bin Wang, Wenbo Shi:
A Privacy-Preserving, Decentralized and Functional Bitcoin E-Voting Protocol. 252-256 - Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai:
Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden. 257-262 - Yanxue Jia, Lei Fan:
Generate Public Randomness Based on Blockchain. 263-270 - Hirotsugu Seike, Takeo Hamada, Takahiro Sumitomo, Noboru Koshizuka:
Blockchain-Based Ubiquitous Code Ownership Management System without Hierarchical Structure. 271-276
15th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2018)
Track 1: Intelligent/Smart Objects & Interactions (ISOI)
- Hai-Feng Xing, Jiantao Zhou, Xiaoyu Song, Rui-dong Qi:
A Dynamic Multi-Objective Evolutionary Algorithm for Nontrivial Upper Bounds of Real-Time Tasks in Embedded System Design. 277-286 - Jing Long, Dafang Zhang, Wei Liang
, Kuan-Ching Li
:
A Leakage-Resilient FPGA-Based IP Identity Authentication Protocol. 287-292 - Qi Liu, Wei Yang, Yang Xu, Yahui Hu, Qijian He, Liusheng Huang:
DopGest: Dual-Frequency Based Ultrasonic Gesture Recognition. 293-300 - Songyou Xie, Wei Liang
, Jianbo Xu, Mingdong Tang, Tien-Hsiung Weng, Kuan-Ching Li
:
A Novel Bidirectional RFID Identity Authentication Protocol. 301-307 - Shun Wang, Xiaojuan Li, Yong Guan, Rui Wang, Jie Zhang:
Executable Micro-Architecture Modeling and Automatic Verification of EtherCAT. 308-315 - Zhenchao Ouyang
, Yu Liu, Jianwei Niu:
Mining the Critical Conditions for New Hypotheses of Materials from Historical Reaction Data. 316-322 - Xinhua Zhu, Qingsong Guo, Bo Zhang:
A Wikipedia Two-Way Link Vector Model for Measuring Semantic Relatedness. 323-330 - Yongqiang Kong
, Jianhui Huang, Shanshan Huang, Zhengang Wei, Shengke Wang:
Dynamic Representation Learning for Video Action Recognition Using Temporal Residual Networks. 331-337 - Shao-yi Zhu, Siye Wang
, Fangtao Zhang, Yanfang Zhang, Yue Feng, Weiqing Huang:
Environmentally Adaptive Real-Time Detection of RFID False Readings in a New Practical Scenario. 338-345 - Bobo Zhao, Zhu Wang, Zhiwen Yu
, Bin Guo
:
EmotionSense: Emotion Recognition Based on Wearable Wristband. 346-355 - Zhimin Liu, Guihua Duan, Guojun Wang:
Scheduling Algorithm for Area Coverage Problem in Directional Sensor Networks. 356-363 - Jianfei Shen, Yiqiang Chen, Zhiqi Shen, Siyuan Liu:
A Two-Stage Incremental Update Method for Fall Detection with Wearable Device. 364-371 - Yang Gao, Zhengyu Pan, Honghao Wang, Guanling Chen:
Alexa, My Love: Analyzing Reviews of Amazon Echo. 372-380 - Yingchao Cheng
, Zhifeng Hao, Ruichu Cai, Wen Wen, Lijuan Wang, Zhongrun Zhou:
Resource-Aware Stream Processing in High Performance Cloud Environment. 381-388 - Trupil Limbasiya
, Debasis Das
:
Secure and Effective Geo-Data Transmission Scheme for Vehicle-to-Vehicle Communication. 389-396 - Qiaoxiang Xiao, Buqing Cao, Xiangping Zhang, Jianxun Liu, Rong Hu, Bing Li:
Web Services Clustering Based on HDP and SOM Neural Network. 397-404 - Jie Chen, Junjie Peng, Yingtao Wang, Gan Chen:
An Implicit Information Based Movie Recommendation Strategy. 405-410 - Wei Ren
, Simin Li, Ruiyang Xiao, Wei Bi:
Collatz Conjecture for 2^100000-1 Is True - Algorithms for Verifying Extremely Large Numbers. 411-416 - Lei Zhang, Weiqing Cheng, Yinglin Hou:
A Synchronous Gossip Algorithm with Exponential Backoff. 417-424 - Dejiao Niu, Tianquan Liu, Zheng Xia, Tao Cai, Yawen Liu, Yongzhao Zhan:
APRNN: A New Active Propagation Training Algorithm for Distributed RNN. 425-431 - Udsanee Pakdeetrakulwong
:
Semantic Web-Based Approach to Support Rational Unified Process Software Development. 432-438
Track 2: Intelligent/Smart Systems & Services (ISSS)
- Aitor Almeida, Gorka Azkune
, Aritz Bilbao
:
Embedding-Level Attention and Multi-Scale Convolutional Neural Networks for Behaviour Modelling. 439-445 - Miao Ma, Ziang Gao, Jie Wu, Yuli Chen, Xue Zheng:
A Smile Detection Method Based on Improved LeNet-5 and Support Vector Machine. 446-451 - Jia Xie, Zhu Wang, Zhiwen Yu
, Bin Guo
:
Enabling Efficient Stroke Prediction by Exploring Sleep Related Features. 452-461 - Wei Zhou, Yiying Li, Shuhui Chen, Bo Ding:
Real-Time Data Processing Architecture for Multi-Robots Based on Differential Federated Learning. 462-471 - Rui-dong Qi, Jiantao Zhou, Xiaoyu Song:
A Synergistic Cloud Service Approach for Cold Start Problems. 472-479 - Nic Volanschi, Adrien Carteron, Charles Consel:
A Domain-Specific Approach to Unifying the Many Dimensions of Context-Aware Home Service Development. 480-489 - Jiantao Zhou, Xianyang Li, Yan Wang, Xiaoyu Song:
A Cloud Workflow Model Based on Resources Selection. 490-495 - Yao Shu, Chong Chen, Kuang-I Shu, Heng Zhang:
Research on Human Motion Recognition Based on Wi-Fi and Inertial Sensor Signal Fusion. 496-504 - Qiang Lin, Xinshuai Liu, Weilan Wang:
GPS Trajectories Based Personalized Safe Geofence for Elders with Dementia. 505-514 - Junqi Ning, Rong Chen, Zhifeng Zhou:
Improving Large Scale Real-Time Ridesharing with Heuristics for Road Networks. 515-521 - Jianwei Niu, Zheng Li, Shasha Mo, Boyu Fan:
CIGAN: A Novel GANs Model Based on Category Information. 522-529 - Shengjie Li, Xiang Li, Qin Lv, Guiyu Tian, Daqing Zhang:
WiFit: Ubiquitous Bodyweight Exercise Monitoring with Commodity Wi-Fi Devices. 530-537 - Letian Kang, Zhi-Jie Wang, Zhe Quan, Weigang Wu, Song Guo, Kenli Li, Keqin Li:
An Efficient Method for Optimizing PETSc on the Sunway TaihuLight System. 538-545 - Junyi He, Di Zhang, Yuezhi Zhou, Xiang Lan, Yaoxue Zhang:
Towards a Truthful Online Auction for Cooperative Mobile Task Execution. 546-553 - Chunyan An
, Jiantao Zhou:
Resource Demand Forecasting Approach Based on Generic Cloud Workload Model. 554-563 - Lin Jia, Zhi Zhou, Hai Jin:
Optimizing the Performance-Cost Tradeoff in Cross-Edge Analytics. 564-571 - Yufei Chen, Huihui Chen, Ziyang He
, Cong Yang, Yangjie Cao:
Multi-Channel Lightweight Convolution Neural Network for Anterior Myocardial Infarction Detection. 572-578 - Jian He, Zihao Zhang, Weiguo Yu:
Interrupt-Driven Fall Detection System Realized via a Kalman Filter and kNN Algorithm. 579-584 - Yalan Wu, Jigang Wu, Gangqiang Zhou, Long Chen:
A Direction-Based Vehicular Network Model in Vehicular Fog Computing. 585-589 - Qirong Bu
, Gang Yang, Jun Feng, Xingxia Ming:
Wi-Fi Based Gesture Recognition Using Deep Transfer Learning. 590-595 - Guangle Yao, Jiandan Zhong, Tao Lei, Xianyuan Liu
:
Constructing Hierarchical Spatiotemporal Information for Action Recognition. 596-602 - Ruimin Zhao, Jin Wang, Kejie Lu, Jianping Wang, Xiumin Wang, Jingya Zhou, Chunming Cao:
Weakly Secure Coded Distributed Computing. 603-610 - Jingbin Zhang, Peikai Zheng, Meng Ma, Ping Wang:
Toward Ubiquitous Environment: An Scalable Framework for Autonomous Service Composition. 611-618 - Guorui Li, Haobo Chen, Sancheng Peng, Xinguang Li, Cong Wang, Pengfei Yin:
A Hybrid Data Collection Scheme for Wireless Sensor Networks Using Compressed Sensing. 619-626 - Jie Xu, Wei Ding, Xiaoyan Hu
:
Abnormal Hosts Monitor for City Wide Core Network by Real Time Super Points Cardinality Estimation. 627-634 - Yinglong Dai, Xiangyong Liu, Guojun Wang:
A Body Simulator with Delayed Health State Transition. 635-641 - Jiaye Shao, Yanqin Zhu, Qijin Ji:
Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud Computing. 642-649 - Jie Ren:
A QoE-Based Governor for Web Browsing on Heterogeneous Mobile Systems. 650-655 - Haixiang Hou, Hai Jin, Xiaofei Liao, Deze Zeng:
Stochastic Analysis on Fog Computing Empowered Mobile Crowdsensing with D2D Communications. 656-663 - Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Xiaofei Xing:
Towards Wi-Fi Radar in Collapsed Structures. 664-670 - Hailiang Zhao
, Wei Du, Wei Liu, Tao Lei, Qiwang Lei:
QoE Aware and Cell Capacity Enhanced Computation Offloading for Multi-Server Mobile Edge Computing Systems with Energy Harvesting Devices. 671-678 - Xiaomin Kang, Baoqi Huang, Runze Yang
, Guodong Qi:
Accurately Counting Steps of the Pedestrian with Varying Walking Speeds. 679-686 - Huiying Wang, Dianxi Shi, Bingnan Song:
A Dynamic Role Assignment Formation Control Algorithm Based on Hungarian Method. 687-696
Track 3: Intelligent/Smart Environments & Applications (ISEA)
- Ling Kuang, Lichen Zhang:
Hierarchy Value Density - A Priority Algorithm for Task Scheduling on Cloud. 697-704 - Miao Li, Beihong Jin, Hongyin Tang, Fusang Zhang:
Clustering Large-Scale Origin-Destination Pairs: A Case Study for Public Transit in Beijing. 705-712 - Liang Ge, Junling Liu, Aoli Zhou, Hang Li:
Crime Rate Inference Using Tensor Decomposition. 713-717 - Xiaoyang Wu, Chun Yu, Yuanchun Shi:
Multi-Depth-Camera Sensing and Interaction In Smart Space. 718-725 - Valère Plantevin, Abdenour Bouzouane, Bruno Bouchard, Sébastien Gaboury:
A Novel and Distributed Approach for Activity Recognition Inside Smart Homes. 726-733 - Bang Wang:
CRNet: Corner Recognition from Trajectories Based on Convolutional and Recurrent Neural Networks. 734-740 - Ke Li, Hui Wen, Hong Li, Hongsong Zhu, Limin Sun:
Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence. 741-747 - Xiaoliang Wang, Jianming Jiang, Liang Bai, Baowei Wang:
SWATS: A Lightweight VANET Anonymous Traceback System Based on Random Superposition Watermarking. 748-755 - Linjiang Zheng, Li Chen, Yadong Liu, Jing Huang, Mujun He, Weining Liu:
Urban Road Traffic Congestion Detection Using RFID Data of Vehicles. 756-763 - Jing Wei
, Jin Zhang, Jennifer Boger:
What Wrist Temperature Tells Us When We Sleep Late: A New Perspective of Sleep Health. 764-771 - Hafiz ur Rahman, Guojun Wang, Jianer Chen, Hai Jiang:
Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance. 772-779 - Wei Wang, Chunyan Miao
:
Multi-Resident Activity Recognition with Unseen Classes in Smart Homes. 780-787 - Hongjia Wu, Gaocai Wang, Xiaotong Xu, Jintian Hu:
A Cache Placement Strategy for Energy Savings in CCN. 788-795 - Qing-Yong Wang
, Liang-Yong Xia
, Hua Chai, Yun Zhou:
Semi-Supervised Learning with Ensemble Self-Training for Cancer Classification. 796-803 - Siyang Wang, Jian Deng, Weigang Wu, Jieying Zhou:
RSU Controlled Named Data Networking for Traffic Information Dissemination in Vehicular Networks. 804-811
Track 4: Personalization and Social Aspects (P&SA)
- Walaa Alajali, Wanlei Zhou
, Sheng Wen:
Traffic Flow Prediction for Road Intersection Safety. 812-820 - Bin Yang, Guangquan Xu, Xianjiao Zeng, Jia Liu, Yao Zhang:
A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid. 821-827 - Tian Wang, Hui Tian
, Wenxian Jiang:
Continuous K Nearest Neighbor Query Scheme with Privacy and Security Guarantees in Road Networks. 828-833 - Xi Han, Yang Liu, Zhixin Liu, Yuanai Xie
, Tian Wang:
Power Control in D2D-Based Vehicle Communication with Delayed CSI Feedback. 834-840 - Tong Guo, Bin Guo
, Yi Ouyang, Zhiwen Yu:
Mining and Analyzing User Feedback from App Reviews: An Econometric Approach. 841-848 - Jianwei Niu, Shijie Li, Shasha Mo, Sen Yang, Boyu Fan:
Affective Content Analysis of Online Video Clips with Live Comments in Chinese. 849-856