Abstract is missing.
- Automatic User Interface Generating for Simple Interaction in Pervasive ComputingYongzhi Yang, Peng Zou, Yun Xiang. 3-8 [doi]
- A High-Performance Network-on-Chip Topology for Neuromorphic ArchitecturesNasrin Akbari, Mehdi Modarressi. 9-16 [doi]
- A Survey of Thermal-Aware Routing Protocols in Wireless Body Area NetworksWei Jiang, Zichun Wang, Meng Feng, Tiantian Miao. 17-21 [doi]
- Three-Dimensional DV-Hop Location Technology for Coal Mine Based on WSNsWangsheng Fang, Yezhen Luo, Ying Huang. 22-25 [doi]
- A Novel P2P Service Discovery Algorithm Based on Markov in Internet of ThingsBing Jia, Wuyungerile Li, Tao Zhou. 26-31 [doi]
- Joint Cell Selection and Activation for Green Communications in Ultra-Dense Heterogeneous NetworksTianqing Zhou, Nan Jiang, Dong Qin, Zunxiong Liu, Chunguo Li. 32-37 [doi]
- An Efficient CPA-Secure Encryption Scheme with Equality TestHan Jiang, Qiuliang Xu, Changyuan Liu, Zhe Liu. 38-45 [doi]
- Movie Recommendation System Employing the User-Based CF in Cloud ComputingTianqi Zhou, Lina Chen, Jian Shen. 46-50 [doi]
- Secure Public Audit for Operation Behavior Logs in Shared Cloud StorageZhaoyi Chen, Hui Tian, Jing Lu, Wenqi Chen, Yiqiao Cai, Tian Wang, Yonghong Chen. 51-57 [doi]
- Simulation of DCS Control System for Dimethyl Ether PlantYani Zhang, Maobin Tang. 58-62 [doi]
- Towards Location and Trajectory Privacy Preservation in 5G Vehicular Social NetworkDan Liao, Gang Sun, Ming Zhang, Victor I. Chang, Hui Li. 63-69 [doi]
- A Practical Joint Network-Compressed Coding Scheme for Energy-Efficient Data Gathering in Cooperative Wireless Sensor NetworksXingcheng Liu, Kai Cao, Feng Han, Paul Cull. 70-76 [doi]
- Uplink Resource Scheduling for Power Wireless Private Network Based on NB-IoT and LTE Hybrid TransmissionZhijun Zhuang, Lei Feng, Peng Yu, Wenjing Li. 77-84 [doi]
- The Construction of a Remote Control and Data Collection System of Cai BasedJunqing Li, Changqing Song, Ning Cao, Russell Higgs, Gregory M. P. O'Hare, Cuinan Yang, Qiang Zhou. 85-88 [doi]
- A Blue Noise Pattern Sampling Methods to Prevent AliasingAiyun Zhan, Yuejin Zhang, Zhipeng Lin, Gaoshuai Dai, Dechang Huang. 89-92 [doi]
- Interactive Visualization of the Maximum Intensity Projection MethodDechang Huang, Bo Li, Tingting Li. 93-95 [doi]
- Efficient Format-Preserving Encryption Mode for IntegerShuang Liang, Yanan Zhang, Jiansheng Guo, Changqing Dong, Zheli Liu, Chunfu Jia. 96-102 [doi]
- Embedded Middleware for Distributed Raspberry Pi Device to Enable Big Data ApplicationsSiddharth Bhave, Matt Tolentino, Henry Zhu, Jie Sheng. 103-108 [doi]
- Node Localization Based on Incremental Lms Algorithm with Variable Step SizeMou Wu, WenHua Dai, Zhongyou Wang, Siping Hu. 109-113 [doi]
- A Practical One-Time File Encryption Protocol for IoT DevicesBiao Wei, Guohong Liao, Weijie Li, Zheng Gong. 114-119 [doi]
- Overhead Control Heuristics in Boundary Fair Real-Time Multiprocessor SchedulingM. Naeem Shehzad, Anne-Marie Déplanche, Yvon Trinquet, Richard Urunuela. 120-127 [doi]
- An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop EnvironmentXiaodong Liu, Qi Liu. 128-131 [doi]
- An Improved Smartphone-Based Non-Participatory Crowd Monitoring System in Smart EnvironmentsTarun Kulshrestha, Divya Saxena, Rajdeep Niyogi, Manoj Misra, Dhaval Patel. 132-139 [doi]
- Prediction Based Run-Time Reconfiguration on Many-Core Embedded SystemsZheng Li, Shuibing He, Li Wang. 140-146 [doi]
- Malicious Behavior Analysis of Android GUI Based on ADBLi Yang, Lijun Wang, DongDong Zhang. 147-153 [doi]
- Design of an Intelligent Management System for Agricultural Greenhouses Based on the Internet of ThingsZhaochan Li, JinLong Wang, Russell Higgs, Li Zhou, Wenbin Yuan. 154-160 [doi]
- A Novel Quantum Ant Colony Algorithm Used for Campus PathQin Yong, Binbin Cheng, Yanfang Xing. 161-165 [doi]
- Design and Instrumentation of Portable Monitoring System for Acoustic Measurement Based on Aquatic DensityDaoliang Li, Murtaza Hassan, Khurshied Ahmed Khan, Adnan Abbas, Sehrish Bano. 166-172 [doi]
- A Survey on Deep Learning in Big DataMehdi Gheisari, Guojun Wang, Md. Zakirul Alam Bhuiyan. 173-180 [doi]
- A Study on the Reservoir Intelligent Inspection System Based on the Internet of Things TechnologyQiang Yue, Fusheng Liu, Changqing Song, Yanmin Liu, Ning Cao, Russell Higgs, Junqing Li, Gregory M. P. O'Hare, Cuinan Yang, Qiang Zhou. 181-183 [doi]
- Tower Crane Remote Wireless Monitoring System Based on Modbus/Tcp ProtocolBo Li, Geng Chen, Le Wang, Zhe Hao. 187-190 [doi]
- Research on Application of Local Fruit E-Commerce Based on Internet of ThingsYan Huang, Chuanai Zhou, Ning Cao, Li Zhou. 191-194 [doi]
- A Cloud Aided Privacy-Preserving Profile Matching Scheme in Mobile Social NetworksQiong Cheng, Chong-zhi Gao. 195-198 [doi]
- Recurrent Neural Network Based Classification of ECG Signal Features for Obstruction of Sleep Apnea DetectionMaowei Cheng, Worku J. Sori, Feng Jiang, Adil Khan, Shaohui Liu. 199-202 [doi]
- Protect Sensitive Information against Channel State Information Based AttacksJie Zhang, Zhanyong Tang, Rong Li, XiaoJiang Chen, Xiaoqing Gong, Dingyi Fang, Zheng Wang. 203-210 [doi]
- Service Area Sewage Quality Monitoring System Based on Wireless Sensor NetworkBo Li, Geng Chen, Le Wang. 211-213 [doi]
- Analysis on the Application of Dense Storage Technology in Logistics Based on the IoTLili Sun, JinLong Wang, Russell Higgs, Cuinan Yang. 214-218 [doi]
- Research on Improved Physical Topology Discovery Based on SNMPJing Jiang, Xiaoli Xu, Ning Cao. 219-222 [doi]
- Design of Network Driver Based on Embedded ProcessorBohua Guo, Lei Li, Bin Xue, Ning Cao, Yuyan Shen. 223-225 [doi]
- Optimized Password Recovery for SHA-512 on GPUsCan Ge, Lingzhi Xu, Weidong Qiu, Zheng Huang, Jie Guo, Guozhen Liu, Zheng Gong. 226-229 [doi]
- VMR: Virtual Machine Replacement Algorithm for QoS and Energy-Awareness in Cloud Data CentersRiaz Ali, Yao Shen, Xiangwei Huang, Jingyu Zhang, Ahmad Ali. 230-233 [doi]
- Object Classification Based on 3D Point Clouds Covariance DescriptorHeng Zhang, Bin Zhuang, Yanli Liu. 234-237 [doi]
- LTE/WLAN Heterogeneous Wireless Network Access Control ResearchJunshe Wang, Chaofei Du, Yanfei Wang. 238-241 [doi]
- Monitoring of Inefficient Land Use with High Resolution Remote Sensing Image in a Chinese Mega-CityYing-Qiang Song, Zhuo-Kun Pan, Yi-Lun Liu, Wu Zhou, Yue-ming Hu, Xue-sen Cui. 242-249 [doi]
- Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based LocalizationShuangjiao Zhai, Zhanyong Tang, Dajin Wang, Zhanglei Li, XiaoJiang Chen, Dingyi Fang, Feng Chen. 250-257 [doi]
- Layered Vaccination Strategy StudyChijun Zhang, Qianyun Fu, Ruihong Zhou. 258-260 [doi]
- An Adaptive Multi-Path Video Streaming Scalable Video Coding AlgorithmYuejin Zhang, Aiyun Zhan, Gaoshuai Dai, Zhipeng Lin, Yunxiu Yang. 261-264 [doi]
- Wireless Sensor Routing Protocol Research Based on Forest Fire ProtectionYuanyuan Zhang, Ning Cao, Guofu Chang, Li Zhou, Xiande Yu, Yongming Liu. 265-268 [doi]
- The Research of Elderly Health-Care in Wireless Sensor NetworksWenbin Yuan, Ning Cao, Yingying Wang, Chao Li, Xiaoling Wang, Li Zhou. 269-272 [doi]
- Research on Spectrum Resource Allocation Based on Cognition in LTE SystemJunshe Wang, Yanfei Wang. 273-276 [doi]
- Classification of Urban Construction Land with Worldview-2 Remote Sensing Image Based on Classification and Regression Tree AlgorithmWu Zhou, Ying-Qiang Song, Zhuo-Kun Pan, Yi-Lun Liu, Yue-ming Hu, Xue-sen Cui. 277-283 [doi]
- The Application of Data Mining Technology to Big DataJinLong Wang, Jing Liu, Russell Higgs, Li Zhou, Chuanai Zhou. 284-288 [doi]
- A Security and Efficiency Authentication Scheme Based on Human-Memorable PasswordJianming Cui, Xiaojun Zhang, Jianxin Gao, Ning Cao. 293-296 [doi]
- A Novel Approach to Improve Robustness of Data Mining Models Used in Cyber Security ApplicationsNing Cao, Yingying Wang. 297-300 [doi]
- Network Selection in Hetnets for Advanced IoT Systems: A Demonstration Based on WiFi and LTELina Xu, Ning Cao. 301-304 [doi]
- The Design and Research of the Internet of Things Technology in the Training of Spatial Navigation Ability of Patients with Mild Cognitive ImpairmentNa Li, Yuzhen Xu, Xiuyan Li, Yi Zhai, Ning Cao, Chunhua Bi, Chenfei Qu, Hua Yu, Aijun Liu, Qi Xie. 305-309 [doi]
- The Comparisons of Different Hierarchical Routing Protocols in Wireless Sensor NetworksNing Cao, Mei Wu, Yingying Wang, Xiaoling Wang, Guangsheng Cao, Gang Wang. 310-315 [doi]
- A Multi-Level Security Access Control Framework for Cross-Domain NetworksHongbin Zhang, Junshe Wang, Jiang Chang. 316-319 [doi]
- Mutual Authentication Protocol for RFID Based on ECCLijuan Zheng, Yujuan Xue, Linhao Zhang, Rui Zhang. 320-323 [doi]
- The Comparisons of Different Location-Based Routing Protocols in Wireless Sensor NetworksNing Cao, Yingying Wang, Jianrui Ding, Chuanai Zhou, Yan Li, Yuanyuan Zhang, Xiaoling Wang, Chao Li, Hongjun Li. 324-327 [doi]
- Remote Monitor System Design of Edible Fungus Greenhouse Basing on ZigBeeXiaoling Wang, Shuang Han, Ning Cao, Wenbin Yuan. 328-331 [doi]
- Research on, and Development of, Data Extraction and Data Cleaning Technology Based on the Internet of ThingsZhaochan Li, Lili Sun, Russell Higgs. 332-341 [doi]
- Research on Unified Architecture of IoT SystemWeigong Lv, Fanchao Meng, Ce Zhang, Yuefei Lv, Ning Cao, Jianan Jiang. 345-352 [doi]
- The Research on the Scheduling Method of Server in Data-CenterShaohua Cao, Ning Cao. 353-355 [doi]
- The Study on the Life Signs of Clinical Patients Monitored by Electronic Wrist BandWenqian Qi, Yi Zhai. 356-359 [doi]
- The Electronic Commerce in the Era of Internet of Things and Big DataJing Liu, Lili Sun, Russell Higgs, Yuanyuan Zhang, Yan Huang. 360-363 [doi]
- A New Location Privacy Protection AlgorithmLijuan Zheng, Huanhuan Yue, Linhao Zhang, Xiao Pan. 364-367 [doi]
- Application of Wireless Sensor Network in Water Quality MonitoringYang Xu, Fugui Liu. 368-371 [doi]
- Analysis of Clustering Routing Protocols and Evaluation Methods in Wireless Sensor NetworksMei Wu, Ning Cao, Guofu Li, Qiusha Min, Yuanyuan Zhang, Chao Li. 372-375 [doi]
- Research on Low Power Hierarchical Routing Protocol in Wireless Sensor NetworksXiujuan Fei, Yingying Wang, Aijun Liu, Ning Cao. 376-378 [doi]
- The Development of Green Logistics Based on the Internet of ThingsJing Liu, Zhaochan Li, Russell Higgs, Li Zhou, Guofu Chang. 379-383 [doi]
- Research on Stochastic Modeling in Wide Aisle Order Picking System Blocking Based on Complex NetworkLi Zhou, Xiaoqing Zhao, Ning Cao. 387-391 [doi]
- The Construction of the Integration of Water and Fertilizer Smart Water Saving Irrigation System Based on Big DataPeng Zhang, Qian Zhang, Fusheng Liu, Junqing Li, Ning Cao, Changqing Song. 392-397 [doi]
- New Algorithm Enumerating Bent Functions Based on Value Distribution and Run LengthYongbin Zhao, Fengrong Zhang, Chaohui Qi, Ning Cao. 398-401 [doi]
- An Improved Authentication Protocol Dependent on Registration Center for Multiserver EnvironmentJianming Cui, Yong Huo. 402-405 [doi]
- Intelligent Refrigerator Based on Internet of ThingsShouming Qiao, Hongzhen Zhu, Lijuan Zheng, Jianrui Ding. 406-409 [doi]
- The Research on Innovative Application of E-Commerce in IoT EraPengfei Guo, Meiling Han, Ning Cao, Yuyan Shen. 410-413 [doi]
- Research on Traceability of Agricultural Products Based on Internet of ThingsYongbin Zhao, Ning Cao. 414-417 [doi]
- Potential Application of Biosensor in Food Nutrition LabelingYi Zhai, Tao Zhang, Na Li, Wenqian Qi, Meng Zhou. 418-421 [doi]
- Design and Implementation of Human Health Monitoring Platform Based on Internet of Things TechnologyYingjian Liu, Jianming Cui. 422-425 [doi]
- The Comparison of Single-Hop and LEACH Protocols in Wireless Sensor NetworksNing Cao, Yongbin Zhao, Jing Liang, Tiantian Wang, Teng Huang, Dongchen Xu, Yuzhen Xu. 426-429 [doi]
- The Design of Greenhouse Monitoring System Based on ZigBee WSNsYan Liu, Chunhua Bi. 430-433 [doi]
- Research on the Application of IoT in E-CommerceHua Yu, Xi Zhang. 434-436 [doi]
- Analysis on the Application of the Internet of Things Technology to Jingdong Mall's Supply Chain ManagementLili Sun, Jing Liu, Russell Higgs, Li Zhou. 437-442 [doi]
- Hidden Path: Dynamic Software Watermarking Based on Control Flow ObfuscationZhe Chen, Chunfu Jia, Donghui Xu. 443-450 [doi]