Abstract is missing.
- A Design of High-Performance Streetlights Management SystemBoyu Sun, Min Dong, Kaihong Yang, Sheng Bi. 1-6 [doi]
- A Home-Based IoT-Enabled Framework for Sleep Behaviour AssessmentSarah Fallmann, Liming Chen, Feng Chen. 7-15 [doi]
- A Knowledge-Based Multiplayer Collaborative Routing in Opportunistic NetworksXiaoheng Deng, Huan Chen, Ruting Cai, Feng Zeng, Guangquan Xu, Honggang Zhang. 16-21 [doi]
- A New Evolutionary Algorithm Based on Self-Adaptive Grouping and Efficient Resource AllocationSen Liu, Liwen Liu, Xuyan Liu, Yuping Wang, Baoming Bai. 22-27 [doi]
- A Pseudonym Certificate Management Scheme Based on Blockchain for Internet of VehiclesShihan Bao, Ao Lei, Haitham S. Cruickshank, Zhili Sun, Philip Michael Asuquo, Waleed Hathal. 28-35 [doi]
- A Spark-Based Approach for High-Efficiency Embedded Feature SelectionFan Zhou, Zhongyang Han, Jun Zhao 0004, Wei Wang 0036. 36-43 [doi]
- Analysis and Prediction of Differential Parking BehaviorsLai Tu, Zhen Ma, Benxiong Huang. 44-49 [doi]
- C3-Sex: a Chatbot to Chase Cyber PervertsJossie Murcia Triviño, Sebastián Moreno Rodríguez, Daniel O. Díaz López, Félix Gómez Mármol. 50-57 [doi]
- Consistent Offline Update of Suspended Virtual Machines in CloudsKenichi Kourai, Yuji Shiota. 58-65 [doi]
- Culture-Based Color Influence Paths Analysis by Using Eye-Tracking DevicesBo Wu 0007, Shoji Nishimura, Qun Jin, Yishui Zhu. 66-71 [doi]
- Deep Learning Technology for Chiller Faults DiagnosisKe Yan, Jun-Hua. 72-79 [doi]
- Engagement Detection in e-Learning Environments using Convolutional Neural NetworksMahbub Murshed, M. Ali Akber Dewan, Fuhua Lin, Dunwei Wen. 80-86 [doi]
- Hybrid Collaborative Filtering with Semi-Stacked Denoising Autoencoders for RecommendationHairui Zou, Chaoxian Chen, Changjian Zhao, Bo Yang 0011, Zhongfeng Kang. 87-93 [doi]
- IoT Nodes Equipment Selection Based on MADM: A Case Study of Groundwater Quality Detection EquipmentWei He, Jing Wang, Beng Wu, Hui Luan, Huaqing Liang, Chong Chen. 94-100 [doi]
- KID Model Realization Using Memory Networks for Text-Based Q/A Analyses and LearningJiandong Li, Runhe Huang, Kevin I-Kai Wang, Jiannong Cao. 101-108 [doi]
- Many-to-Many Collaborator Recommendation Based on Matching Markets TheoryXiangjie Kong, Linyan Wen, Jing Ren, Mingliang Hou, Minghao Zhang, Kang Liu, Feng Xia 0001. 109-114 [doi]
- Multi-trait Selection Model of Dairy Cow Based on the Mixed Leapfrog AlgorithmLinjing Wei, Wenke Dong, Yangping Wang, Shirun Gan. 115-120 [doi]
- Pop-up Recommended Illustrations for E-Book Readers Using Text Analysis TechniquesMasato Shimokubo, Runhe Huang, Kevin I-Kai Wang. 121-127 [doi]
- Privacy-Preserving Deep Learning Models for Law Big Data Feature LearningXu Yuan, Jianing Zhang, Zhikui Chen, Jing Gao, Peng Li. 128-134 [doi]
- Research on Temporary Building Monitoring of Railway Construction Based on Remote Sensing ImageYangping Wang, Xinlei Ren, Zhengping Zhu, Decheng Gao. 135-141 [doi]
- Research on Vehicle Routing Problem with time Windows Based on the Dragonfly AlgorithmChenlei Liu, Wenhan Tao, Chencong Zhao, Xinwan Li, Yaning Su, Zhixin Sun. 142-148 [doi]
- Searchable Encryption Using Secret-Sharing Scheme for Multiple Keyword Search Using Conjunctive and Disjunctive SearchingAhmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura. 149-156 [doi]
- Study on Quantization Decision Algorithm for Feature Matching of Turf Grass IntroducingLinjing Wei, Wenke Dong, Yangping Wang, Shirun Gan. 157-162 [doi]
- Study on the Matching Algorithm of Turf Grass Introduction Features Based on Big Data AnalysisLinjing Wei, Wenke Dong, Shirun Gan, Yangping Wang. 163-169 [doi]
- Text Detection on Books Using CNN Trained with Another Domain DataRiku Anegawa, Masayoshi Aritsugi. 170-176 [doi]
- The Central Community of Twitter ego-Networks as a Means for Fake Influencer DetectionNicolas Tsapatsoulis, Vasiliki Anastasopoulou, Klimis S. Ntalianis. 177-184 [doi]
- Towards Integrative Personal Character Modeling Using Multi-strategy Fusion Across Scenarios and PeriodsAo Guo, Jianhua Ma, Kevin I-Kai Wang. 185-192 [doi]
- Two-Layer Group Signature and Application to E-CashHanwen Feng, Jianwei Liu, Qianhong Wu, Tongge Xu. 193-200 [doi]
- Visualization Design Based on Personal Health Data and Persona AnalysisQun Jin, Zhi Li. 201-206 [doi]
- Prediction of Stock Prices with Sentiment Fusion and SVM Granger CausalityJintak Park, King Ma, Henry Leung. 207-214 [doi]
- A Distributed Video Analytics Architecture Based on Edge-Computing and Federated LearningAbdelkarim Ben Sada, Mohammed Amine Bouras, Jianhua Ma, Runhe Huang, Huansheng Ning. 215-220 [doi]
- A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network EdgeMarat Zhanikeev. 221-227 [doi]
- A Novel Strategy for Barrier Confident Information Coverage in Sensor NetworksYalan Jiang, Lingzhi Yi, Lu Zhu, Zhenkun Jin, Xianjun Deng, Minghua Wang, Yong Liu, Xiangyang Li. 228-231 [doi]
- A Review of Issues and Challenges in Fog Computing EnvironmentChenlei Liu, Feng Xiang, Pan Wang, Zhixin Sun. 232-237 [doi]
- A Sequential Scheme for Detecting Cyber Attacks in IoT EnvironmentYan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai. 238-244 [doi]
- An Assistive Augmented Reality-based Smartglasses Solution for Individuals with Autism Spectrum DisorderEduardo Machado, Ivan Carrillo, David Saldana, Liming Chen 0001. 245-249 [doi]
- An Incremental Broad Learning Approach for Semi-Supervised ClassificationXize Liu, Tie Qiu, Chen Chen 0006, Huansheng Ning, Ning Chen. 250-254 [doi]
- Applying SMOTE for a Sequential Classifiers Combination Method to Improve the Performance of Intrusion Detection SystemSornxayya Phetlasy, Satoshi Ohzahata, Celimuge Wu, Toshihito Kato. 255-258 [doi]
- Computational Model for Wearable Hardware CommoditiesKaroline Moholth McClenaghan, Ole Christian Moholth. 259-265 [doi]
- CPG-FS: A CPU Performance Graph Based Device Fingerprint Scheme for Devices Identification and AuthenticationShiquan Dong, Fadi Farha, Shan Cui, Jianhua Ma, Huansheng Ning. 266-270 [doi]
- ICA-Based EEG Feature Analysis and Classification of Learning StylesKhawla Alhasan, Suleiman Onimisi Aliyu, Liming Chen 0001, Feng Chen 0004. 271-276 [doi]
- Evaluation Approach Based upon Knowledge Delivery Process in Smart Teaching EnvironmentChengxin Zhang, Huiquan Zhang, Di He, Fei Hao. 277-281 [doi]
- FalconEye: A High-Performance Distributed Security Scanning SystemCheng Wang, Xin Liu, Xiaokang Zhou, Rui Zhou, Dong Lv, Qingquan Lv, Mingsong Wang, Qingguo Zhou. 282-288 [doi]
- Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant LogicHongbiao Gao, Jianbin Li, Jingde Cheng. 289-294 [doi]
- Location Privacy Protection Method Based on a Proxy in Un-Trusted Mobile Social NetworksBidi Ying, Amiya Nayak. 295-300 [doi]
- Minimizing Energy for Caching Resource Allocation in Information-Centric Networking with Mobile Edge ComputingYayuan Tang. 301-304 [doi]
- Mining Key Scholars via Collapsed Core and TrussShuo Yu, Yuanhu Liu, Jing Ren, Hayat Dino Bedru, Teshome Megersa Bekele, Liangtian Wan, Feng Xia 0001. 305-308 [doi]
- Online Ventricular Segmentation System Based on Machine LearningYilin Hu, Hang Yin, Binbin Yong, Yunshan Cao, Xing Zhou, Rui Zhou 0005, Qingquan Lv, Mingsong Wang. 309-314 [doi]
- Power of Communication Behind Extreme Cybersecurity IncidentsMasato Kikuchi, Takao Okubo. 315-319 [doi]
- Practical Key Recovery Model for Self-Sovereign Identity Based Digital WalletsReza Soltani, Uyen Trang Nguyen, Aijun An. 320-325 [doi]
- Product Surface Defect Detection Based on CNN Ensemble with RejectionKai Su, Qiangfu Zhao, Po Chun Lien. 326-331 [doi]
- Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality ManagementMehrdad Sharbaf. 332-337 [doi]
- Security and Trust Issues on Digital Supply ChainHaibo Zhang, Toru Nakamura, Kouichi Sakurai. 338-343 [doi]
- Traceable Decentralized Anonymous E-Cash System Against Active AttackersHanwen Feng, Jianwei Liu, Qianhong Wu, Tongge Xu. 344-349 [doi]
- Data Mining and Machine Learning Applications for Educational Big Data in the UniversityKeisuke Abe. 350-355 [doi]
- A Proposal of Music-Based Personal Authentication SystemShusei Narumi, Mitsuharu Matsumoto. 356-359 [doi]
- Policy Management Technique Using Blockchain for Cloud VM MigrationToshihiro Uchibayashi, Bernady O. Apduhan, Norio Shiratori, Takuo Suganuma, Masahiro Hiji. 360-362 [doi]
- Semantic Model for Creating an Instance of the IoTRadmila Juric. 363-366 [doi]
- The Implementation of Wireless Industrial Internet of Things (IIoT) Based Upon IEEE 802.15.4-2015 TSCH Access ModeHo-Ting Wu, Kai-Wei Ke, Song-Ferng Wang, Po-Hung Chen, Guan-Dee Lee, Chen-Yu Tseng, Chen-Yu Ho. 367-369 [doi]
- Emotion Recognition from Speech to Improve Human-Robot InteractionChangrui Zhu, Wasim Ahmad. 370-375 [doi]
- Energy-Efficient Signal Processors with Silent Mirror Tracer for Long-Term Activity MonitoringJaeyong Jung, Jeonghun Cho, Daejin Park. 376-379 [doi]
- Hand Gesture Detection Based Real-Time American Sign Language Letters Recognition using Support Vector MachineXinyun Jiang, Wasim Ahmad. 380-385 [doi]
- Health Activities Monitoring and Warning System for Geriatric Daily Living in Extra Care HomesHua Li, Cheng Yang, Zhilin He, Muhammad Ali Imran, Wasim Ahmad. 386-391 [doi]
- Inertial Sensors to Detect Multiple Gait DisordersWhenhao Cheng, Yuxiang Guo, Pengting Chen, Yue Pang, Xinyun Jiang, Wasim Ahmad. 392-396 [doi]
- Assistive and Monitoring Multifunctional Smart Crutch for ElderlyJiaye Yang, Yanjun Liu, Yanjun Chen, Huiyang Nie, Zhanqiu Wang, Xu Liu, Muhammad Ali Imran, Wasim Ahmad. 397-401 [doi]
- Novel Flexible and Wearable 2.4 GHz Antenna for Body-Centric ApplicationsAbdoalbaset Abohmra, Sophia Ramani, Abubakar Sharif, Muhammad Ali Imran, Qammer H. Abbasi, Wasim Ahmad. 402-405 [doi]
- A Large-Scale Empirical Study of Internet Users' Privacy Leakage in ChinaYuanming Zhang, Shuo Zhang, Yuchao Zhang, Jing Tao, Pinghui Wang. 406-411 [doi]
- Big Data Driven Computing Offloading Scheme with Driverless Vehicles AssistanceChengling Chen, Zhou Su, Weiwei Li, Yuntao Wang. 412-416 [doi]
- Large-Scale Network Traffic Analysis and Retrieval System Using CFS AlgorithmTing Han, Yuanming Zhang, Hezhen Li, Xiaoyu Zhang, Jing Tao. 417-421 [doi]
- User Identification Cross Multiple Social Media Platform with Revised Input Output Network Embedding FrameworkJingyuan Liu, Wei Li 0029, Tao Qin, Liang Zhao, Yuli Gao, Wenqiang Ma. 422-426 [doi]
- A Hybrid Algorithm for Influence Maximization of Social NetworksYongze Lin, Xinyuan Zhang, Liting Xia, Yue Ren, Weimin Li. 427-431 [doi]
- Clinical Knowledge Graph Embeddings with Hierarchical Structure for Thyroid Treatment RecommendationDehua Chen, Chuang Ma, Yunying Wu. 432-436 [doi]
- Influence Maximization Based on Node Attraction ModelGuijiang Wang, Jiulei Jiang, Weimin Li, Can Wang. 437-441 [doi]
- OCDAD: An Overlapping Community Detecting Algorithm using Attention Degree in Directed Ex-EgoNetFurong Chang, Bofeng Zhang, Songxian Wu, Yue Zhao, Bingchun Li, Jiarila Maimaitiriyimu. 442-448 [doi]
- Quantitative µ-Calculus Model Checking Algorithm Based on Generalized Possibility MeasuresPanqing Zhang, Jiulei Jiang, Zhanyou Ma, Heng Zhu. 449-453 [doi]
- AgentPi: An IoT Enabled Motion CCTV Surveillance SystemBahman A. Sassani Sarrafpour, Andrew David, Xiaosong Li, Farhad Mehdipour. 454-458 [doi]
- An Efficient Synchronization Algorithm in OFDM-Based NB-IoT SystemsYuxiang Lv, Hao Qin, Zhiwei Liu, Yawen Dong, Wenjiang Feng, Weiyang Xu. 459-464 [doi]
- An Emergency Mobile Communication System Based on Fixed-Wing Drone and Satellite Transmission AccessJian Zhou, Yu Su, Penglin Li. 465-470 [doi]
- Joint Power Control and Pilot Assignment Algorithm in Multi-cell Multi-user Massive MIMO SystemsWenjiang Feng, Yuxiang Lv, Qing Wu, YaJuan Guo, Zhiwei Liu, Xiaolong Bao. 471-477 [doi]
- An IGS Algorithm Applied to DNA Sequence DesignKaiqiang Liu, Bin Wang 0005, Yuan Liu, Ranfeng Wu, Xun Zhang, Xin Liu, Qiang Zhang 0008, Zhixiang Yin. 478-482 [doi]
- An Incremental Feature Selection Approach Based on Information Entropy for Incomplete DataChuan Luo, Tianrui Li, Zhang Yi 0001. 483-488 [doi]
- An Internet Medical Care-Oriented Service Security Open PlatformKexiong Dong, Weiwei Luo, Xiaohua Pan, Jianwei Yin. 489-492 [doi]
- Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation TechniquesBahman A. Sassani Sarrafpour, Rosario Del Pilar Soria Choque, Blake Mitchell Paul, Farhad Mehdipour. 493-498 [doi]
- Link Prediction Based on Gravitational Field of Complex NetworkYanlin Yang, Zhonglin Ye, Haixing Zhao, Lei Meng. 499-504 [doi]
- Pulmonary Nodule Detection Based on Multi-branch 3D Squeeze-and-Excitation NetworkYuechao Zhang, Jianxin Zhang, Chao Che, Kai Lin, Dongsheng Zhou, Qiang Zhang 0008, Xiaopeng Wei. 505-509 [doi]
- Research on Security Testing and Simulation Platform of Smart Grid Substation SystemYudai Xue, Jinsong Wang, Yuemin Ding, Honghao Zhang. 510-515 [doi]
- A Semantic-Based Short-Text Fast Clustering Method on Hotline Records in ChengduXiaorong Pu, Kun Long, Kecheng Chen, Mei Xie, Jiancheng Lv, Dezhong Peng. 516-521 [doi]
- An Interactive System for Detection and Analysis of Mandibular Cystic LesionsJixiang Guo, Lei Zhang 0005, Yuanyuan Chen, Wei Tang. 522-526 [doi]
- Design, Development and Testing of a Wearable sEMG Acquisition SystemLei Shi, Kunpeng Wang, Zhen Liu. 527-532 [doi]
- A Study on the Reduction of Mowing Work Burden for Maintaining Landscapes in Rural Areas: Experiment Design for Mowing Behaviors AnalyzeBo Wu 0007, Yuan Wu, Yoko Aoki, Shoji Nishimura, Masayuki Kashiwagi. 533-536 [doi]
- Life Assistants for the Elderly Based on Mobile DevicesWenjie Diao, Zhigang Gao, Ruichao Xu, Yunfeng Xie, Ke Yan, Hongyi Guo. 537-542 [doi]
- Ubi-Care: a Decentralized Ubiquitous Sensing Healthcare System for the Elderly Living SupportHong Chen. 543-547 [doi]
- Keep Rogue IoT Away: IoT Detector Based on Diversified TLS NegotiationChih-Wen Ou, Fu-Hau Hsu, Chia-Min Lai. 548-555 [doi]
- Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and ManifoldNikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel. 556-563 [doi]
- Privacy-Enabled Recommendations for Software VulnerabilitiesLinus Karlsson, Nicolae Paladi. 564-571 [doi]
- Low-Cost and Fast Failure Recovery Using In-VM Containers in CloudsTomonori Morikawa, Kenichi Kourai. 572-579 [doi]
- Distributed Data AnonymizationFabio Martinelli, Mina Sheikh Alishahi. 580-586 [doi]
- IoT Based Hybrid Green Energy Driven Highway Lighting SystemMd. Arafatur Rahman, Marufa Y. Mukta, Abu Yousuf, A. Taufiq Asyhari, Md. Zakirul Alam Bhuiyan, Che Yahaya Yaakub. 587-594 [doi]
- Stuck-at Fault Resilience using Redundant Transistor Logic GatesRichard McWilliam, Philipp Schiefer, Alan Purvis, Samir Khan. 595-601 [doi]
- Towards a Privacy-Preserving Voting System Through Blockchain TechnologiesRabeya Bosri, Abdur Razzak Uzzal, Abdullah Al Omar, A. S. M. Touhidul Hasan, Md. Zakirul Alam Bhuiyan. 602-608 [doi]
- A Novel Blockchain Scheme Combining Prime Numbers and Iris for Encrypting CodingGerardo Iovane, Michele Nappi, Marta Chinnici, Alfredo Petrosino, Aniello Castiglione, Silvio Barra. 609-618 [doi]
- Analysis of Community In Social Networks Based on Game TheoryAniello Castiglione, Giovanni Cozzolino, Vincenzo Moscato, Giancarlo Sperlì. 619-626 [doi]
- Reconfigurable Fault-Safe Processor Platform Based on RISC-V for Large-Scaled IoT-Driven ApplicationsHyeongyun Moon, Jeonghun Cho, Daejin Park. 627-632 [doi]
- SMT-Based Bounded Model Checking of Embedded Assembly Program with InterruptionsKousuke Uemura, Satoshi Yamane. 633-639 [doi]
- TraceFilter: An Exploitability Analyzer of Vulnerabilities in Binary CodeSeong-Kyun Mok, Eun-Sun Cho. 640-645 [doi]
- Towards Enabling Autonomic Computing in IoT EcosystemMohammad Tahir, Qazi Mamoon Ashraf, Mohammad Dabbagh. 646-651 [doi]
- HiMessage: An Interactive Voice Mail System with the Humanoid Robot PepperPaola Barra, Carmen Bisogni, Antonio Rapuano, Andrea Francesco Abate, Gerardo Iovane. 652-656 [doi]
- Structural Change Models of Online Social Networks Caused by External Factors Like Mass MediaMasaki Aida, Yuya Kakizawa. 657-662 [doi]
- Some Technology Issues in a Connected WorldYukikazu Nakamoto. 663-666 [doi]
- Evaluation Framework Using Simulator and Mobile Device for Developing Evacuation Route Guidance in MANET-Based Building Evacuation SystemShinnosuke Murakami, Tomoyuki Ohta, Jürgen Dunkel, Yoshiaki Kakuda. 667-671 [doi]
- Development of Local Landslide Danger-Related Information Notification System on TV Set for Early EvacuationKoichi Shin, Haruka Kodama, Masahiro Nishi. 672-676 [doi]
- A Dynamic System for Forming Convoys Consisting of Connected VehiclesKazuki Uyama, Shinji Inoue, Yoshiaki Kakuda. 677-680 [doi]
- Information Propagation that Induces Evacuation Behavior at the Time of DisasterEiji Utsunomiya. 681-686 [doi]
- Model-Based Methods for Quality Evaluation of Cloud ServicesArun Adiththan, Kaliappa Ravindran. 687-692 [doi]
- A Framework for Localizing Aging-Related Bugs in a Random and Dynamic WayXiaoyi Zhang, Junjun Zheng. 693-698 [doi]
- Markov Model of Web Services for Their Performance Based on Phase-Type ExpansionYanjie Liu, Zheng Zheng, Jiantao Zhang. 699-704 [doi]
- An Experimental Study for Optimal Homotopy Property of Motion Planning AlgorithmsYang Liu, Jiantao Zhang, Yizhi Zeng, Haonan Yao, Jiankang Li, Jing Zhang. 705-709 [doi]
- Multi-Concern Integrated Engineering of Dependable Intelligent SystemsElena Troubitsyna. 710-715 [doi]
- RRT* Algorithm Under Holonomic Conditions for UAVsMinyang Kang, Yizhi Zeng, Haonan Yao, Jing Zhang, Yanjie Liu. 716-720 [doi]
- FPGA-Based Implementation of Reduced-Complexity Filtering Algorithm for Real-Time Location TrackingWei-Ting Chen, Shih-Lun Chen, Yih-Shyh Chiou, Ting-Lan Lin, Fu-Jung Wen, Yang-Ke Lin. 721-726 [doi]
- Research on Reliable Path Planning of Manipulator Based on Artificial BeaconsJia Song, Kai Zhao, Huiyan Weng, Xu Wang, Yang Liu. 727-732 [doi]
- Hardware-Accelerated Similarity Search with Multi-Index HashingLeandro Santiago de Araújo, Victor da Cruz Ferreira, Brunno Figueiroa Goldstein, Alexandre Solon Nery, Leandro Augusto Justen Marzulo, Sandip Kundu, Felipe Maia Galvão França. 733-740 [doi]
- Regression Training using Model Parallelism in a Distributed CloudJoel Reijonen, Miljenko Opsenica, Roberto Morabito, Miika Komu, Mohammed Elmusrati. 741-747 [doi]
- Superposition of Dual Image Fusion with Improved Dehazing Methods for high Visibility of Underwater ImageAhmad Shahrizan Abdul Ghani, Ahmad Fakhri Ab. Nasir. 748-753 [doi]
- A Novel Algorithm for Efficient Labeling and Its Application to On-Road Risk DetectionYixin Hu, Qiangfu Zhao, Yoichi Tomioka. 754-760 [doi]
- Composite Gaussian Function Modeling of Mobility Prediction Accuracy for Wireless UsersLu Liu, Wuyang Zhou, Sihai Zhang, Wei Cai. 761-767 [doi]
- Achieving Accurate Ubiquitous Sleep Sensing with Consumer Wearable Activity Wristbands Using Multi-class Imbalanced ClassificationZilu Liang, Mario Alberto Chapa Martell. 768-775 [doi]
- Improved Medical Image Segmentation Algorithm Using Two-Step CNN ArchitectureMi Gyung Cho, Uram Ko, Hyekyung Lee, Hwan-Gue Cho. 776-781 [doi]
- Bringing 5G Into User's Smart HomeBruno Dzogovic, Bernardo Santos 0001, Thanh Van Do, Boning Feng, Van Thuan Do, Niels Jacot. 782-787 [doi]
- WiTrack: Human-to-Human Mobility Relationship Tracking in Indoor Environments Based on Spatio-Temporal Wireless Signal StrengthTing-Han Chen, Sok-Ian Sou, Yinman Lee. 788-795 [doi]
- Exploiting Spatial Locality for Content Placement in Roadside-Unit Caching with Delay ConstraintSok-Ian Sou, Ciao-Ling Lou, Yinman Lee. 796-802 [doi]
- Generative Model for Probabilistic InferenceYi Liu, Yunchun Li, Honggang Zhou, Hailong Yang, Wei Li. 803-810 [doi]
- Context-Aware Voice-Based Interaction in Smart Home - VocADom@A4H Corpus Collection and Empirical Assessment of Its UsefulnessFrançois Portet, Sybille Caffiau, Fabien Ringeval, Michel Vacher, Nicolas Bonnefond, Solange Rossato, Benjamin Lecouteux, Thierry Desot. 811-818 [doi]
- Lightweight Polygonal Approximation-Based ECG Signal Processing PlatformJunho Kwak, Seungmin Lee, Jeonghun Cho, Daejin Park. 819-824 [doi]
- A Denoising Framework for Image CaptionYulong Zhang, Yuxin Ding, Rui Wu, Fuxing Xue. 825-832 [doi]
- Camera-in-Hand Robotic Arm Using a Deep Neural Network to Realize Unmanned Store ServiceOscal Tzyh-Chiang Chen, Yu-Cheng Zhang, Zheng Kuan Lin, Pei-I Kuo, Yi Lun Lee. 833-839 [doi]
- A Density-Based Decision-Making Data Fusion Method for Multiapplication Wireless Sensor NetworksClaudio M. de Farias, Flávia Coimbra Delicato, Giancarlo Fortino. 840-847 [doi]
- Automatic Localization of Passive Infra-Red Binary Sensors in Home: from Dense to Scattered NetworkNathavuth Kitbutrawat, François Portet, Hirozumi Yamaguchi, Teruo Higashino. 848-853 [doi]
- Evaluation of Transfer Learning for Human Activity Recognition Among Different DatasetsMd Shafiqul Islam, Tsuyoshi Okita 0003, Sozo Inoue. 854-859 [doi]
- Intelligence Stratum for IoT. Architecture Requirements and FunctionsEdgar Ramos, Roberto Morabito. 860-867 [doi]
- A Method of Classifying Japanese Sign Language using Gathered Image Generation and Convolutional Neural NetworksShin-ichi Ito, Momoyo Ito, Minoru Fukumi. 868-871 [doi]
- Diffusion Kernel Based Mobility Prediction for Wireless UsersLu Liu, Sihai Zhang, Wuyang Zhou, Wei Cai, Qimei Cui. 872-875 [doi]
- Optimal Resource Reservation Scheme for Maximizing Profit of Service Providers in Edge Computing FederationYuansheng Luo, Shi Qiu. 876-879 [doi]
- Metro Passenger and Freight Transport: A Framework for Underground Logistics SystemYiming He, Qiang Wang, Hailong Chen, Chuanqi Gao. 880-882 [doi]
- Extensible On-Body Smartphone Localization: A Project Overview and Preliminary ExperimentMitsuaki Saito, Kaori Fujinami. 883-884 [doi]
- A Framework for Human-Centric Personalization of Context Recognition Models on Mobile DevicesKaori Fujinami, Trang Thuy Vu, Koji Sato. 885-888 [doi]
- Internet of Things in Agriculture: A Decision Support System for Precision FarmingLambros Lambrinos. 889-892 [doi]
- The Extraction of key Distinct Features for Identification and Classification of Helicopters using Micro-Doppler SignaturesVikas Agnihotri, Munish Sabharwal, Vinay Goyal. 893-896 [doi]
- Rate Maximization for Cell-Free Massive MIMO with Low-Resolution ADCsYao Zhang, Haotong Cao, Meng Zhou, Shengchen Wu, Longxiang Yang. 897-900 [doi]
- Blockchain as a Service for Software Defined Networks: A Denial of Service Attack PerspectiveArnab Bose, Gagangeet Singh Aujla, Maninderpal Singh, Neeraj Kumar 0001, Haotong Cao. 901-906 [doi]
- Software Defined UAV-Based Location Aware Deployment Scheme for Optimal Wireless CoverageSahil Vashisht, Sushma Jain, Ravinder Singh Mann. 907-912 [doi]
- IPTV Video Hardware Encryption Transmission System AnalysisQin Wang, Feng Zhang. 913-917 [doi]
- Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set TheoryXianxian Li, Chunfeng Luo, Peng Liu, Li e Wang. 918-923 [doi]
- Improved SLAM Merged 2D and 3D Sensors for Mobile RobotsHanghang Deng, Qiang Wang, Jingtao Sun. 924-929 [doi]
- Combinatorial Properties of Multimedia IPP Codes of Length 2Jing Jiang 0003, Chengyao Zhao, Minquan Cheng, Hongyan Dong. 930-935 [doi]
- Symmetric and Positive Splitting Iteration for Space Fractional Diffusion EquationZhixuan Huang, Junfeng Yin. 936-940 [doi]
- A Threshold-Based Visual Odometry in a Composite Environment Using Edges and PointsShuxuan Lu, Qiang Wang, Jingtao Sun. 941-945 [doi]
- L-DAG: Enabling Loopy Workflow in Scientific Application with Automatic DAG TransformationXin You, Hailong Yang, Zhongzhi Luan, Depei Qian. 946-953 [doi]
- Base Station Allocation for Users with Overlapping Coverage in Wirelessly Networked Disaster AreasYu Wang 0064, Michael Conrad Meyer, Junbo Wang. 954-960 [doi]
- Multi-factor Based Stock Price Prediction Using Hybrid Neural Networks with Attention MechanismChen Li, Xu Zhang, Mahboob Qaosar, Saleh Ahmed, Kazi Md. Rokibul Alam, Yasuhiko Morimoto. 961-966 [doi]
- The Comparison and Verification of Some Efficient Packet Capture and Processing TechnologiesJiaqian Li, Chengrong Wu, Jiawei Ye, Jiong Ding, Qinwei Fu, Jiatao Huang. 967-973 [doi]
- A Page Cache Management Scheme in Cloud Computing EnvironmentsHsung-Pin Chang, Chien-Neng Liao, Da-Wei Chang. 974-979 [doi]
- Dynamic Controller-Switch Mapping Assignment with Genetic Algorithm for Multi-controller SDNBiao Han, Xiangrui Yang, Xiaoyan Wang. 980-986 [doi]
- A Programming Environment for Visual IoT on Raspberry PiKen T. Murata, Praphan Pavarangkoon, Somnuk Phon-Amnuaisuk, Takamichi Mizuhara, Kazunori Yamamoto, Kazuya Muranaga, Toshiki Aoki. 987-992 [doi]
- Predicting Food POI Attractions for Smart Business using Passenger Commuting PatternsSyed Muhammad Asim Ali Rizvi, Weifeng Lv, Bowen Du, Haiquan Wang, Runhe Huang. 993-1000 [doi]
- Age of Information-Aware Multi-tenant Resource Orchestration in Network SlicingXianfu Chen, Celimuge Wu, Tao Chen, Nan Wu, Honggang Zhang, Yusheng Ji. 1001-1007 [doi]
- Bis: A Novel Blockchain Based Bank-Tax Interaction System in Smart CityZhihui Lu 0002, Xiaoli Wan, Jian Yang, Jie Wu, Cheng Zhang, Patrick C. K. Hung, Shih-Chia Huang. 1008-1014 [doi]
- Utilizing Latent Posting Style for Authorship Attribution on Short TextsPatamawadee Leepaisomboon, Mizuho Iwaihara. 1015-1022 [doi]
- Evaluating the Performance of Machine Learning Sentiment Analysis Algorithms in Software EngineeringJingyi Shen, Olga Baysal, M. Omair Shafiq. 1023-1030 [doi]
- Hybrid Machine Learning Approach for Electric Load ForecastingJui-Chieh Kao, Chun-Chih Lo, Chin-Shiuh Shieh, Yu-Cheng Liao, Jun Wei Liu, Mong-Fong Horng. 1031-1037 [doi]
- Consumer Segmentation: Improving Energy Demand Management through Households Socio-AnalyticsShailendra Singh 0007, Abdulsalam Yassine, Rachid Benlamri. 1038-1045 [doi]
- Gold Price Forecast Based on LSTM-CNN ModelZhanhong He, Junhao Zhou, Hong-Ning Dai, Hao Wang. 1046-1053 [doi]
- LoRa Communication Maps of Medium-Sized Rural City in Japan via Community Bus ServicesKen T. Murata, Kohei Mizutani, Yoshiaki Muroyama, Kazunori Yamamoto, Kazuya Muranaga, Takamichi Mizuhara, Praphan Pavarangkoon, Kazuki Kobayashi. 1054-1059 [doi]
- Big Data Analytics for Personalized Recommendation SystemsCarson K. Leung, Abhishek Kajal, Yeyoung Won, Justin M. C. Choi. 1060-1065 [doi]
- Sentiment Analysis on Tweets Using Machine Learning and Combinatorial FusionJames Ho, Dominik Ondusko, Brandon Roy, D. Frank Hsu. 1066-1071 [doi]
- Traffic Flow Prediction with Compact Neural NetworksYuhang Li, Celimuge Wu, Tsutomu Yoshinaga, Yusheng Ji. 1072-1076 [doi]
- Adaptive Confidence Evaluation Scheme for Periodic Activity Recognition in Smart Home EnvironmentsYi-En Tan, Chun-Chih Lo, Chin-Shiuh Shieh, Denis Miu, Mong-Fong Horng. 1077-1081 [doi]
- A Framework of Page Synchronization for Adaptable Virtual Machine Live MigrationCho-chin Lin, Wei-Ping Goh, Shyi-Tsong Wu. 1082-1085 [doi]
- Performance Improvement of High-Speed File Transfer Over JHPCNPraphan Pavarangkoon, Takeshi Nanri, Ken T. Murata, Kazunori Yamamoto, Kazuya Muranaga, Takamichi Mizuhara, Keiichiro Fukazawa, Ryusuke Egawa, Takahiro Katagiri, Masao Ogino. 1086-1089 [doi]
- A Tensor Model for Quality Analysis in Industrial Drinking Water Supply SystemDi Wu, Hao Wang, Razak Seidu. 1090-1092 [doi]
- Dynamic Replication Scheduling for Cloud Datacenters Based on Workload StatisticsYu-Ju Chen, Wan-Chi Chang, Pi-Chung Wang. 1093-1096 [doi]