Abstract is missing.
- Stochastic Optimization of Electric Vehicle Charging StationsGeorgios Chrysanidis, Dimitrios Kosmanos, Antonios Argyriou, Leandros A. Maglaras. 1-7 [doi]
- Software-Defined Edge Computing (SDEC): Principles, Open System Architecture and ChallengesPengfei Hu, Wai Chen. 8-16 [doi]
- A Multi-modal Framework for Future Emergency SystemsAhmed Basil, Mu Mu, Michael Agyeman. 17-20 [doi]
- Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of ThingsHussain Al-Aqrabi, Anju P. Johnson, Richard Hill. 21-28 [doi]
- Optimal Demand Side Management in Generation Constrained Power SystemsJulius Quarshie Azasoo, Triantafyllos Kanakis, Ali Al-Sherbaz, Michael Opoku Agyeman. 29-36 [doi]
- Towards a Smart(er) Social Science Using High-Dimensional Continuous-Time Trajectories from the Open Dynamic Interaction Networks (ODIN) PlatformBilal Khan, Kirk Dombrowski, Alekhya Bellam, Gisela Font Sayeras, Kin Pi, Devan Crawford, Patrick Habecker, Maisha Jauernig. 37-44 [doi]
- Improving a 3-D Convolutional Neural Network Model Reinvented from VGG16 with Batch NormalizationNontawat Pattanajak, Hossein Malekmohamadi. 45-50 [doi]
- A Scalable and Reliable Model for Real-time Air Quality PredictionLiying Li, Zhi Li, Lara Reichmann, Diane Woodbridge. 51-57 [doi]
- A Dynamic Grid-Based Algorithm for Taxi Ridesharing in Multiple Road ConditionYuxin Wang, Bin Wu, Tongkun Xu, Yanming Shen, Feng Chen. 58-65 [doi]
- An Integrated Framework for Packing CAN-FD Frames and Assigning OffsetsShan Ding, Hui Wang, Gang Zeng. 66-73 [doi]
- Leveraging Graph Neural Network with LSTM For Traffic Speed PredictionZhilong Lu, Weifeng Lv, Zhipu Xie, Bowen Du, Runhe Huang. 74-81 [doi]
- An Automatic Laser Scanning System for Objects with Unknown ModelYipeng Yang, Zhan Li, Zhaoting Li, Liu Yang, Yingxin Yan. 82-87 [doi]
- A Smart Gateway Enabling OPC UA and DDS InteroperabilityRanti Endeley, Tom Fleming, Nanlin Jin, Gerhard Fehringer, Steve Cammish. 88-93 [doi]
- Fuzzy-Based Fine-Grained Human Activity Recognition within Smart EnvironmentsDarpan Triboan, Liming Chen 0001, Feng Chen 0004. 94-101 [doi]
- Prediction of Road Traffic Flow Based on Deep Recurrent Neural NetworksZoe Bartlett, Liangxiu Han, Trung Thanh Nguyen 0002, Princy Johnson. 102-109 [doi]
- Predicting Unethical Physician Behavior At Scale: A Distributed Computing FrameworkAnastasia Keck, Miguel Romero, Robert Sandor, Diane Woodbridge, Paul Intrevado. 110-116 [doi]
- Happy Cows, Happy Milk: Smart Cows and Quality FactorsMassimo Marchiori. 117-124 [doi]
- Real-time Outlier Detection Over Streaming DataKangqing Yu, Wei Shi 0001, Nicola Santoro, Xiangyu Ma. 125-132 [doi]
- Visual Attention-Based Object Detection in Cluttered EnvironmentsEduardo Manuel Silva Machado, Ivan Carrillo, Miguel Collado, Liming Chen 0001. 133-139 [doi]
- Efficient BLE Fingerprinting through UWB Sensors for Indoor LocalizationQing Zhang, Matthew D'Souza, Uyen Balogh, Vanessa Smallbon. 140-143 [doi]
- Image-Based Text Classification using 2D Convolutional Neural NetworksErinc Merdivan, Anastasios Vafeiadis, Dimitrios Kalatzis, Sten Hanke, Joahannes Kroph, Konstantinos Votis, Dimitrios Giakoumis, Dimitrios Tzovaras, Liming Chen 0001, Raouf Hamzaoui, Matthieu Geist. 144-149 [doi]
- Object Handling of Cognitive Robots Using Deep Leaning Based Object RecognitionHyunsik Ahn. 150-153 [doi]
- Virtualisation as a Means for Dynamic Software Update within the Automotive E/E ArchitectureNicholas Ayres, Lipika Deka, Benjamin N. Passow. 154-157 [doi]
- Autonomous System Design for Dam Surveillance RobotsChao Zhang, Qi Wang, Quanzhong Zhan, Ting He, Yi An. 158-161 [doi]
- Multi-Robot Cooperation System Based on Wireless NetworkYan Zhang, Qingfeng Xia, Yongyi Xu. 162-165 [doi]
- A Public Domain Dataset for Human Activity Recognition in Free-Living ConditionsFederico Cruciani, Chen Sun, Shuai Zhang 0001, Chris D. Nugent, Chunping Li, Shaoxu Song, Cheng Cheng, Ian Cleland, Paul J. McCullagh. 166-171 [doi]
- Effects of Task-Dependent Robot Errors on Trust in Human-Robot Interaction: A Pilot StudyClara Haider, Yegor Chebotarev, Christiana Tsiourti, Markus Vincze. 172-177 [doi]
- A Privacy Aware Architecture for IoT Enabled SystemsIsmini Psychoula, Liming Chen 0001, Xuanxia Yao, Huansheng Ning. 178-183 [doi]
- Autonomus air Quality Management System Based on Web of Things Standard ArchitectureJose Gabriel Teriús-Padrón, Ezequiel Simeoni, Rebeca I. García-Betances, Nikolaos Liappas, Eugenio Gaeta, María Fernanda Cabrera-Umpiérrez, María Teresa Arredondo Waldmeyer. 184-189 [doi]
- Best Practices on Personalization and Adaptive Interaction Techniques in the Scope of Smart Homes and Active Assisted LivingNikolaos Liappas, Jose Gabriel Terius-Padron, Eduardo Machado, Mohammad Reza Loghmani, Rebeca Isabel García-Betances, Markus Vincze, Ivan Carrillo Quero, María Fernanda Cabrera-Umpiérrez. 190-195 [doi]
- Minimizing Errors in the Nursing Profession with Technology-Enhanced Education and TrainingWenbing Zhao, William Matcham, Conor Mclennan, Selma Koc, Reed Chen, Dylan Siegler. 196-201 [doi]
- Access Control for Physical Objects in Internet of ThingsRongyang Li, Shan Cui, Xuanxia Yao. 202-206 [doi]
- Recognition of Similar Activities Based on Activity RelationshipQingjuan Li, Huansheng Ning, Ismini Psychoula, Liming Chen 0001. 207-212 [doi]
- An Autonomous Navigation and Exploration System for Search and Rescue Robots in Mine IncidentsNoé Pérez-Higueras, Alberto Jardón, Ángel Rodríguez, Carlos Balaguer. 213-218 [doi]
- Surface Exploration with a Robot-Trailer System for Autonomous Subsurface ScanningEfthimios Tsiogas, Ioannis Kostavelis, Georgios Kouros, Andreas Kargakos, Dimitrios Giakoumis, Dimitrios Tzovaras. 219-224 [doi]
- A New Shopfloor Orchestration Approach for Collaborative Human-Robot Device DisassemblyIoannis Chatzikonstantinou, Dimitrios Giakoumis, Dimitrios Tzovaras. 225-230 [doi]
- Automatic Subsurface Map Generation Based on GPR Data ProcessingEvangelos Skartados, Ioannis Kostavelis, Dimitrios Giakoumis, Dimitrios Tzovaras. 231-236 [doi]
- uSLAM Implementation for Autonomous Underground RobotElisabeth Menendez, Santiago Martínez de la Casa Díaz, Marcos-Marín, Carlos Balaguer. 237-241 [doi]
- Design and Implementation of a Control System for a Tunneling RobotKevin Worrall, Cameron Houston, Mikulas Cebecauer, Thaleia Flessa, Euan William McGookin, Douglas G. Thomson, Patrick Harkness. 242-247 [doi]
- External Manipulation of Autonomous VehiclesGábor Kiss. 248-252 [doi]
- Man-Tracking and Sign Cutting by Surveillance UAVMahmod Al-Bkree. 253-256 [doi]
- Towards a Framework for Monitoring and Analyzing High Performance Computing Environments Using Kubernetes and PrometheusNitin Sukhija, Elizabeth Bautista. 257-262 [doi]
- Exploring Performance and Energy Consumption Differences between Recent Intel ProcessorsUnai Lopez-Novoa. 263-267 [doi]
- Employing Blockchain Technology for Decentralized Crowdsourced Data Access and ManagementNitin Sukhija, Elizabeth Bautista, Moon Moore, John-George Sample. 268-273 [doi]
- Puffle-Pod Marine Evacuation System (POMES)Eda Tumer, Stefan Kuhn. 274-278 [doi]
- FFMRA: A Fully Fair Multi-Resource Allocation Algorithm in Cloud EnvironmentsHamed Hamzeh, Sofia Meacham, Kashaf Khan, Keith Phalp, Angelos Stefanidis. 279-286 [doi]
- IoT in effective distance learning processRodion Yakoubovsky. 287-290 [doi]
- Benefit and Cost of Cloud Computing SecurityWen Zeng, Vasileios Germanos. 291-295 [doi]
- Intelligent Algorithms in Home Energy Management Systems: A SurveyQi Liu, Williams Dannah, Xiaodong Liu. 296-299 [doi]
- A Survey on Demand-Response in HEMS: Algorithm Types, Objectives and ConstraintsMingxu Sun, Raphael Anaadumba, Qi Liu, Xiaodong Liu, Yi Yang. 300-304 [doi]
- Embedding Private Standards in AI and Mitigating Artificial Intelligence RisksMartijn Scheltema. 305-310 [doi]
- Creating Companions for Senior Citizens with Technologies That Mimic PeopleDavid Wright. 311-316 [doi]
- AI and Information Warfare in 2025David Wright. 317-322 [doi]
- Ethics and Design in the Smart Bikeshare DomainRobert Bradshaw. 323-328 [doi]
- What if we Had Fair, People-Centred Data Economy Ecosystems?Jani Koskinen, Sari Knaapi-Junnila, Minna M. Rantanen. 329-334 [doi]
- Technofixing the Future: Ethical Side Effects of Using AI and Big Data to Meet the SDGsMark Ryan, Josephina Antoniou, Laurence Brooks, Tilimbe Jiya, Kevin Macnish, Bernd Stahl. 335-341 [doi]
- AI Management An Exploratory Survey of the Influence of GDPR and FAT PrinciplesChiara Addis, Maria Kutar. 342-347 [doi]
- Automated Automobiles in SocietyOlli I. Heimo, Kai K. Kimppa, Antti Hakkala. 348-353 [doi]
- Internet Filtering: A Solution to Harmful and Illegal Content?Marie Eneman. 354-359 [doi]
- Robotic Chinese Calligraphy with Human PreferenceFei Chao, Fei Chao, Jitu Lyu, Ruiqi Wu, Xingen Gao, Changle Zhou, Longzhi Yang, Chih-Min Lin, Changjing Shang. 360-366 [doi]
- Study of LSTM Model in Sea Surface Temperature Prediction of the Yellow Sea Cold Water Mass AreaZikun Chen, Junyu Dong. 367-371 [doi]
- Multi-Level Similarity Learning for Low-Shot RecognitionHongwei Xv, Xin Sun, Junyu Dong, Shu Zhang, Qiong Li. 372-377 [doi]
- The BIDS Toolbox: A web Service to Manage Brain Imaging DatasetsUnai Lopez-Novoa, Cyril Charron, C. John Evans, Leandro Beltrachini. 378-382 [doi]
- PhytoGAN: Unpaired Dead-to-Live Phytoplankton TranslationShuai Han, Xin Sun, Junyu Dong, Shu Zhang, Qiong Li. 383-388 [doi]
- Spatial-Temporal Skeleton Feature: An Unit-Level Feature for Temporal Action Proposal GenerationTingting Chen, Junyu Dong, Lin Qi, Shu Zhang, Xiang Wang, Qilu Zhao. 389-394 [doi]
- Optimization Strategies for Real-Time Rendering of Virtual Scenes on Heterogeneous Mobile DevicesWei Gai, Xiyu Bao, Meng Qi, Yafang Wang, Juan Liu, Gerard de Melo, Lu Wang, LiZhen Cui, Chenglei Yang, Xiangxu Meng. 395-400 [doi]
- Semi-Supervised Learning Based on Local Adaptive KernelsGuo Niu, Yanchun Gu, Zhikui Duan. 401-405 [doi]
- Leveraging an Instance Segmentation Method for Detection of Transparent MaterialsAmanuel Hirpa Madessa, Junyu Dong, Xinghui Dong, Ying Gao, Hui Yu 0001, Israel Mugunga. 406-412 [doi]
- Catch the Shadow: Person Tracking Under Occlusion with a Single RGB-D CameraWei Gai, Meng Qi, Lu Wang, Chenglei Yang, Juan Liu, Yulong Bian, Gerard de Melo, Shijun Liu, Xiangxu Meng. 413-418 [doi]
- Leveraging Blowing as a Directly Controlled InterfaceYeqing Chen, Yulong Bian, Chenglei Yang, Xiyu Bao, Yafang Wang, Gerard de Melo, Juan Liu, Wei Gai, Lu Wang, Xiangxu Meng. 419-424 [doi]
- DrowsyDet: A Mobile Application for Real-time Driver Drowsiness DetectionChaohui Yu, Xin Qin, Yiqiang Chen, Jindong Wang 0001, Chenchen Fan. 425-432 [doi]
- Deep Neural Network Based Multiple Targets DOA Estimation for Millimeter-Wave RadarGeyu Tang, Xingyu Gao, Zhenyu Chen, Yu Zhang, Huicai Zhong, Menggang Li. 433-438 [doi]
- Indoor Trajectory Restoration Method Based on PoI Relation ConstraintsXinlong Jiang, Yunbing Xing, Yiqiang Chen, Yang Gu, Junfa Liu. 439-446 [doi]
- CoFINLo: Coarse to Fine Indoor Navigation and Localization SystemYang Gu, Yiqiang Chen, Xinlong Jiang, Jiwei Wang, Yunlong Xiao, Tong Wu. 447-453 [doi]
- A Collaborative Multi-modality Selection Method Based on Data Utility AssessmentYunlong Xiao, Yang Gu, Jiwei Wang, Tong Wu. 454-459 [doi]
- Synchronous n-Step Method for Independent Q-Learning in Multi-Agent Deep Reinforcement LearningXudong Gong, Bo Ding, Jie Xu, Huaimin Wang, Xing Zhou, Hongda Jia. 460-467 [doi]
- ViHand: Gesture Recognition with Ambient LightQianhong Hu, Zhiwen Yu 0001, Zhu Wang, Bin Guo, Chao Chen. 468-474 [doi]
- LWS: A LoRaWAN Wireless Underground Sensor Network Simulator for Agriculture ApplicationsKevin I-Kai Wang, Shiyang Wu, Ameer Ivoghlian, Zoran Salcic, Andrew Austin, Xiaokang Zhou. 475-482 [doi]
- A Driving Attention Detection Method Based on Head PoseYa Li, Jiying Li, Xinlong Jiang, Chenlong Gao, Teng Zhang. 483-490 [doi]
- Differential Privacy-Based Indoor Localization Privacy Protection in Edge ComputingXuejun Zhang, Qian Chen, Xiaohui Peng, Xinlong Jiang. 491-496 [doi]
- Passive Embroidered Stretch Sensor Utilizing UHF RFID AntennasMengxia Yu, Silong Wang, Yulong Liu, Lulu Xu, Terry Tao Ye. 497-501 [doi]
- A Multi-database Hybrid Storage Method for Big Data of Power Dispatching and ControlZhenyu Chen 0001, Dapeng Li, Can Cui, Yunhao Huang, Jiaqi Wang, Fangchun Di, Lixin Li, Jie Zhang, Lingxu Guo, Xingyu Gao. 502-507 [doi]
- Study on Optimal Allocation of Inference Nodes for Distributed Inference in Smart EnvironmentCheng-Liang Wang, Xin-Tian Huang, Min-Hui Zou, Rahim Baig. 508-513 [doi]
- Network-Aware Data Transmission Scheduling for Saving Energy in Cellular NetworksDi Zhang 0010, Yuezhi Zhou, Yaoxue Zhang. 514-521 [doi]
- Traffic Speed Prediction with Missing Data Based on TGCNLiang Ge, Hang Li, Junling Liu, Aoli Zhou. 522-529 [doi]
- A Context-Aware Map Matching Method Based on Supported DegreeCongcong Liu, Hengxin Chen, Mingqi Gao. 530-535 [doi]
- Deep Spatial-Temporal Fusion Network for Fine-Grained Air Quality PredictionLiang Ge, Aoli Zhou, Hang Li, Junling Liu. 536-543 [doi]
- A LSTM Based Bus Arrival Time Prediction MethodLingqiu Zeng, Guangyan He, Qingwen Han, Lei Ye, Fengxi Li, Lidong Chen. 544-549 [doi]
- Decision-Making for Drone Services in Urban Environments: a Simulated Study on Clients' Satisfaction and Profit MaximisationSeng W. Loke, Majed Alwateer. 550-557 [doi]
- A Scoring Method for Driving Safety Credit Using Trajectory DataWenfu Wang, Yao Yang, An Chen, Zhijie Pan. 558-565 [doi]
- Persistent Transportation Traffic Volume Estimation with Differential PrivacyWenjian Yang, Yu-e Sun, He Huang 0001, Yang Du 0006, Danlei Huang, Fanzhang Li, Yonglong Luo. 566-573 [doi]
- Varied Priority-Based Data Forwarding via NDN in VANETSiyang Wang, Weigang Wu, Zhi Zhou. 574-581 [doi]
- Short-Term Travel Time Prediction on Urban Road Networks using Massive ERI DataJing Huang, Linjiang Zheng, Jiangling Qin, Dong Xia, Li Chen, Dihua Sun. 582-588 [doi]
- CNNLoc: Deep-Learning Based Indoor Localization with WiFi FingerprintingXudong Song, Xiaochen Fan, Xiangjian He, Chaocan Xiang, Qianwen Ye, Xiang Huang, Gengfa Fang, Liming Luke Chen, Jing Qin, Zumin Wang. 589-595 [doi]
- Power Load Prediction Based On An Improved Clock-Work RNNFangwan Huang, Shijie Zhuang, Zhiyong Yu. 596-601 [doi]
- CurveCluster: Automated Recognition of Hard Landing Patterns Based on QAR Curve ClusteringXu Li, Jiaxing Shang, Linjiang Zheng, Dajiang Liu, Lin Qi, Liu Liu. 602-609 [doi]
- Gaze-Based Assessment of Dyslexic Students' Motivation within an E-Learning EnvironmentRuijie Wang, Liming Chen 0001, Aladdin Ayesh, Jethro Shell, Ivar Solheim. 610-617 [doi]
- Enhancing Multi-hop Sensor Calibration with Uncertainty EstimatesBalz Maag, Zimu Zhou, Lothar Thiele. 618-625 [doi]
- Multi-Source Data Integration-Based Urban Road GPS Environment Friendliness EstimationLiantao Ma, Yasha Wang, Guangju Peng, Chaohe Zhang, Chao Chen 0004, Junfeng Zhao, Jiangtao Wang. 626-633 [doi]
- An Amplification DDoS Attack Defence Mechanism using Reinforcement LearningYuantian Zhang, Yang Cheng. 634-639 [doi]
- HumanFi: WiFi-Based Human Identification Using Recurrent Neural NetworkXingxia Ming, Hongwei Feng, Qirong Bu, Jing Zhang, Gang Yang, Tuo Zhang. 640-647 [doi]
- A Business Process Oriented Dynamic Cyber Threat Intelligence ModelYuanchen Xu, Yingjie Yang, Ying He. 648-653 [doi]
- An Efficient Method for Tri-Axis Magnetometer CalibrationJiakun Li, Kuangi Shu, Heng Zhang. 654-660 [doi]
- Selecting Sensing Location Leveraging Spatial and Cross-Domain CorrelationsHuijuan Chang, Zhiyong Yu, Zhiwen Yu 0001, Bin Guo 0001. 661-666 [doi]
- Fine-Grained Sleep-Wake Behaviour AnalysisSarah Fallmann, Liming Chen 0001, Feng Chen. 667-674 [doi]
- Diabetes Diagnosis and Treatment Research Based on Machine LearningBo He, Kuangi Shu, Heng Zhang 0012. 675-679 [doi]
- Image Caption Generation with Local Semantic Information and Global InformationXing Liu, Weibin Liu, Weiwei Xing. 680-685 [doi]
- BikeNet: Accurate Bike Demand Prediction Using Graph Neural Networks for Station RebalancingRuiying Guo, Zhihan Jiang, Jingchun Huang, Jianrong Tao, Cheng Wang, Jonathan Li, Longbiao Chen. 686-693 [doi]
- Scalable Real-time Prediction and Analysis of San Francisco Fire Department Response TimesXu Lian, Sarah Melancon, Jon-Ross Presta, Adam Reevesman, Brian Spiering, Diane Woodbridge. 694-699 [doi]
- iDrug: Pediatric Drug Interaction Modeling and Risk Evaluation Leveraging Prescription Big DataYunting Shao, Linghong Hong, Tianqi Xie, Binbin Zhou, Jinzhun Wu, Ming Cheng 0002, Cheng Wang, Jonathan Li, Longbiao Chen. 700-706 [doi]
- Fast Adaptation via Meta Learning in Multi-agent Cooperative TasksHongda Jia, Bo Ding, Huaimin Wang, Xudong Gong, Xing Zhou. 707-714 [doi]
- Supervised Nonnegative Tucker Decomposition for Computational PhenotypingKai Yang, Wenqi Sun, Junfeng Zhao, Yasha Wang, Bing Xie. 715-722 [doi]
- Probabilistic Analysis of Temporal and Sequential Aspects of Activities of Daily Living for Abnormal Behaviour DetectionAlexandros Konios, Matias Garcia-Constantino, Stavros-Richard G. Christopoulos, Mustafa Asan Mustafa, Idongesit Ekerete, Colin Shewell, Chris D. Nugent, Gareth Morrison. 723-730 [doi]
- Two-Stream Network with 3D Common-Specific Framework for RGB-D Action RecognitionXiaolei Qin, Yongxin Ge, Jinyuan Feng, Yida Chen, Liuwei Zhan, Xuchu Wang, Yuangan Wang. 731-738 [doi]
- Content and Network Aware Replication and Scheduling Mechanism for User Generated Content VideosQilin Fan, Hao Yin, Geyong Min, Sen Wang, Yongqiang Lyu, Xu Zhang. 739-746 [doi]
- Energy-Efficient Activation/Inactivation Strategy for Long-term IoT Network OperationZhishu Shen, Kenji Yokota, Atsushi Tagami, Teruo Higashino. 747-752 [doi]
- Improving Fast Adaptation for Newcomers in Multi-Robot Reinforcement Learning SystemYiying Li, Wei Zhou, Huaimin Wang, Bo Ding, Kele Xu. 753-760 [doi]
- Dynamic No-Fly Zone for DronesGuiyu Tian, Chunhua Xiao, Weichen Liu. 761-766 [doi]
- An Event-Based User Experience Evaluation Method for Virtual Reality ApplicationsXiaoping Che, Siqi Ma, Qi Yu, Chenfeng Yue. 767-774 [doi]
- MSAHTA: Mixed Spatial Attention and Hierarchical Temporal Aggregation for Action RecognitionJinyuan Feng, Dan Yang 0001, Yongxin Ge, Xiaolei Qin, Yida Chen, Yuangan Wang. 775-782 [doi]
- Learning to Track by Bi-Directional Long Short-Term Memory NetworksChen Pan, Dianxi Shi, Naiyang Guan, Yongjun Zhang, Liujing Wang, Songchang Jin. 783-790 [doi]
- Considerations on the Deployment of Heterogeneous IoT Devices For Smart Water NetworksEssa Q. Shahra, Wenyan Wu, Michele Romano. 791-796 [doi]
- A Fast Action Recognition Method with Cascaded NetworksLiqing Wan, Weiwei Xing, Shunli Zhang, Xiaoping Che. 797-803 [doi]
- Research on Road Condition Detection Based on CrowdsensingYi Yuan, Xiaoping Che. 804-811 [doi]
- k-NN-Based EMG Recognition for Gestures Communication with Limited Hardware ResourcesCarlos Cedeño Z., Jose Cordova-Garcia, Victor Asanza A., Ronald Ponguillo, Leonardo Muñoz M.. 812-817 [doi]
- Dynamic Allocation for Complex Mobile Crowdsourcing Task with Internal DependenciesCongying Yang, Zhiwen Yu 0001, Yimeng Liu, Liang Wang, Bin Guo 0001. 818-825 [doi]
- An Online Computation Offloading Mechanism for Mobile Edge Computing in Ultra-Dense Small Cell NetworksJunyi He, Di Zhang, Yuezhi Zhou, Yaoxue Zhang. 826-833 [doi]
- Your Pedometer Tells You: Attribute Inference via Daily Walking Step CountYiwen Jiang, Wei Tang, Neng Gao, Ji Xiang, Daren Zha, Xiang Li. 834-842 [doi]
- FEDet: Feature Enhancement Single Shot DetectorYangwei Sun, Jian Ye. 843-850 [doi]
- CrowdTravel: Leveraging Cross-Modal CrowdSourced Data for Fine-Grained and Context-Based Travel Route RecommendationJing Zhang, Bin Guo, Zhimin Li, Yan Liu 0021, Zhiwen Yu 0001, Qi Han. 851-858 [doi]
- AI-Powered Text Generation for Harmonious Human-Machine Interaction: Current State and Future DirectionsQiuyun Zhang, Bin Guo, Hao Wang, Yunji Liang, Shaoyang Hao, Zhiwen Yu 0001. 859-864 [doi]
- Sentiment Analysis Based on Attention Mechanisms and Bi-Directional LSTM Fusion ModelMei Wang, Yangyang Zhu, Shulin Liu, Chunfeng Song, Zheng Wang, Pai Wang 0004, Xuebin Qin. 865-868 [doi]
- Characterizing Collective Knowledge Sharing Behaviors in Social NetworkJian Kang, Zhiwen Yu 0001, Yunji Liang, Jiayu Xie, Bin Guo 0001. 869-876 [doi]
- Deep-WiID: WiFi-Based Contactless Human Identification via Deep LearningZhiyi Zhou, Chang Liu, Xingda Yu, Cong Yang, Pengsong Duan, Yangjie Cao. 877-884 [doi]
- Energy-Aware Anomaly Detection in Industrial Multi-Modal IoT ApplicationsXiaocui Li, ZhangBing Zhou, Jine Tang, Lei Shu 0005. 885-890 [doi]
- Correlating MSM's Mental Health with Usage Behaviors on MSM-Specific Social ApplicationsXin Gao, Chaohe Zhang, Liantao Ma, Yasha Wang, Jiangtao Wang, Daqing Zhang 0001. 891-898 [doi]
- MUSEFood: Multi-Sensor-Based Food Volume Estimation on SmartphonesJunyi Gao, Weihao Tan, Liantao Ma, Yasha Wang, Wen Tang. 899-906 [doi]
- Measures to Improve Outdoor Crowdsourcing Photo Collection on Smart PhonesHuihui Chen, Bin Guo 0001, Zhiwen Yu 0001. 907-915 [doi]
- Using Eye Tracking to Gain Insight into TV Customer Experience by Markov ModellingZhi Chen, Shuai Zhang, Sally McClean, Gaye Lightbody, Michael Milliken, Ian Kegel, Aygul Garifullina. 916-921 [doi]
- Egocentric Hand Track and Object-Based Human Action RecognitionGeorgios Kapidis, Ronald Poppe, Elsbeth A. van Dam, Lucas P. J. J. Noldus, Remco C. Veltkamp. 922-929 [doi]
- Code Refactoring from OpenMP to MapReduce Model for Big Data ProcessingJunfeng Zhao, Minjia Zhang, Hongji Yang. 930-935 [doi]
- A New Image Classification Architecture Inspired by Working MemoryJiahui Shen, Ji Xiang, Nan Mu, Lei Wang. 936-943 [doi]
- CrackSense: A CrowdSourcing Based Urban Road Crack Detection SystemLiang Wang, Congying Yang, Zhiwen Yu 0001, Yimeng Liu, Zhu Wang, Bin Guo. 944-951 [doi]
- Wearable Sensors Based Automatic Box and Block Test SystemYingwei Zhang, Yiqiang Chen, Hanchao Yu, Zepign Lv, Pan Shang, Yiyi Ouyang, Xiaodong Yang 0005, Wang Lu. 952-959 [doi]
- Comparing CNN and Human Crafted Features for Human Activity RecognitionFederico Cruciani, Anastasios Vafeiadis, Chris D. Nugent, Ian Cleland, Paul J. McCullagh, Konstantinos Votis, Dimitrios Giakoumis, Dimitrios Tzovaras, Liming Chen 0001, Raouf Hamzaoui. 960-967 [doi]
- Ontological Modeling of Ubiquitous Accessible Learning Context for Disabled LearnersNesrine Ben Salah, Inés Bayoudh Saâdi, Marion Hersh, Henda Ben Ghezala. 968-973 [doi]
- An Improved ACO with First-job Restriction and P-ANT for Batch Scheduling ProblemYang Yang, Zhaohong Jia, Yiwen Zhang, Kai Li. 974-980 [doi]
- Urban Micro-Circulation Bus Planning Based on Temporal and Spatial Travel DemandBowen Du, Yanan Qiao, Jiejie Zhao, Leilei Sun, Weifeng Lv, Runhe Huang. 981-988 [doi]
- Towards Deep Learning on Resource-Constrained Robots: A Crowdsourcing Approach with Model PartitionZhibo Huai, Bo Ding, Huaimin Wang, Mingyang Geng, Lei Zhang. 989-994 [doi]
- Traffic Accident Prediction Based on Deep Spatio-Temporal AnalysisLe Yu, Bowen Du, Xiao Hu, Leilei Sun, Weifeng Lv, Runhe Huang. 995-1002 [doi]
- HISMA: A Human-Machine Iterative Schema Matching AlgorithmShuang Tang, Junfeng Zhao, Yasha Wang, Da Cui. 1003-1010 [doi]
- IFC: Your Invisible Fitness Coach Based on CSI SensingWei Zhang, Hongbo Ni, Meijuan He, Junqi Liu, Zhu Wang, Xingshe Zhou. 1011-1018 [doi]
- Online Intelligent Resource Management for Power-Delay Tradeoff in Backhaul-Limited Mobile Edge Computing SystemsYuan Sun 0004, Gang Yang, Xing-She Zhou. 1019-1024 [doi]
- Friend Recommendation Algorithm Based on Interest and Cognition Combined with Feedback MechanismYunfei Yin, Xuesong Feng. 1025-1030 [doi]
- Assessing Mental Stress Based on Smartphone Sensing Data: An Empirical StudyFeng Wang, Yasha Wang, Jiangtao Wang, Haoyi Xiong, Junfeng Zhao, Daqing Zhang 0001. 1031-1038 [doi]
- BDMF: A Biased Deep Matrix Factorization Model for RecommendationChangsheng Ma, Jianjun Li, Peng Pan, Guohui Li, Junbo Du. 1039-1045 [doi]
- A Carpooling Service for Private Vehicles Using Electronic Registration Identification DataChen Cui, Linjiang Zheng, Dong Xia, Li Chen, Dihua Sun. 1046-1054 [doi]
- Personalized Preference Collaborative Filtering: Job Recommendation for GraduatesQing Zhou, Fenglu Liao, Liang Ge, Jianglin Sun. 1055-1062 [doi]
- Dynamic Ensemble Pruning Selection using Meta-Learning for Multi-Sensor Based Activity RecognitionJingjing Cao, Wenjing Yuan, Wenfeng Li, Xiaozheng E. 1063-1068 [doi]
- Device Free Human Activity Recognition using WiFi Channel State InformationNeena Damodaran, Jörg Schäfer. 1069-1074 [doi]
- Modeling Chinese Input Interaction for Patients with Cloud Based LearningFarzana Jabeen, Linmi Tao, Tong Lin, Shanshan Mei. 1075-1082 [doi]
- LISC: Location Inference Attack Enhanced by Spatial-Temporal-Social CorrelationsBing Li, Hong Zhu, Meiyi Xie. 1083-1092 [doi]
- Projection-Induced Access Point Deployment for Fingerprint-Based Indoor PositioningQiaolin Pu, Joseph Kee-Yin Ng, Kai Liu 0001. 1093-1100 [doi]
- Attributed Network Embedding via a Siamese Neural NetworkJiong Wang, Neng Gao, Jia Peng, Jingjie Mo. 1101-1108 [doi]
- Handling Fingerprint Sparsity for Wi-Fi Based Indoor Localization in Complex EnvironmentsHao Li, Joseph K. Ng, Kai Liu. 1109-1116 [doi]
- Mutual Graph Embedding in LBSN: Capturing Multi-Factor Influence for Point-of-Interest PredictionZhengxun Zhao, Weiqi Xu, Cong Xue, Lei Wang. 1117-1122 [doi]
- CoxRF: Employee Turnover Prediction Based on Survival AnalysisQianwen Zhu, Jiaxing Shang, Xinjun Cai, Linli Jiang, Feiyi Liu, Baohua Qiang. 1123-1130 [doi]
- Personal Trait Analysis Using Word2vec Based on User-Generated TextGuanqun Sun, Ao Guo, Jianhua Ma, Jianguo Wei. 1131-1137 [doi]
- An Effective Deep Learning Approach for Dialogue Emotion Recognition in Car-Hailing PlatformYuxin Zhang, Yiqiang Chen, Chenlong Gao. 1138-1145 [doi]
- Optimal Bandwidth Allocation for Web Crawler SystemsWeiping Zhu 0004, Yaodong Li, Yi Xu, Xiaohui Cui. 1146-1153 [doi]
- Game Theoretical Study on a Client-Controlled Deduplication SchemeXueqin Liang, Zheng Yan 0002, Wenxiu Ding, Robert H. Deng. 1154-1161 [doi]
- Where to Build New Public Toilets? Multi-Source Urban Data Tell the TruthChaoxiong Chen, Yuyang Liu, Chengwu Liao, Chao Chen, Liang Feng, Zhu Wang. 1162-1169 [doi]
- LSTM Based Semi-Supervised Attention Framework for Sentiment AnalysisHanxue Ji, Wenge Rong, Jingshuang Liu, Yuanxin Ouyang, Zhang Xiong. 1170-1177 [doi]
- Attention-Based Adaptive Sampling for Continuous EMG Data StreamsGiovanni Schiboni, Juan Carlos Suarez, Rui Zhang 0027, Oliver Amft. 1178-1183 [doi]
- Interactive Design of Geofences for Proactive Location-Based Services in Smart CitiesSandro Rodriguez Garzon, Thomas Pöllabauer, Sebastian Zickau, Axel Küpper. 1184-1187 [doi]
- Enhanced Approach for Finger Vein Recognition using BLPOCTae Yeong Hah, Sang-Lim Ju, Kyung-Seok Kim. 1188-1191 [doi]
- Collaborating with Users in Proximity for Decentralized Mobile Recommender SystemsFelix Beierle, Tobias Eichinger. 1192-1197 [doi]
- Towards Autonomic Educational Cyber Physical SystemsSamia Bachir, Laurent Gallon, Angel Abenia, Philippe Aniorté, Ernesto Exposito. 1198-1204 [doi]
- ILFS: Intelligent Lost and Found System using Multidimensional Matching ModelYinnan Yao, Xiunan Zheng, Kun Ma. 1205-1208 [doi]
- Visualising the Invisible: Augmented Reality and Virtual Reality as Persuasive Technologies for Energy FeedbackAlexander David Fredericks, Zhong Fan, Sandra I Woolley. 1209-1212 [doi]
- Exploring Mobile Phone Data for Urban Activity Analysis: Applications from Individual Activity Pattern to Group Activity RegularityRong Xie. 1213-1218 [doi]
- Individual Risk Prediction of Gastric Cancer Using Fully Connected Neural Network with Weighted Neighborhood FeatureJun Liao, Dandan Liu, Junfeng Hu, Yande Li, Aamir Khan, Li Liu, Qingyu Xiong, Junhao Wen. 1219-1224 [doi]
- Modeling Data-Driven Liver Cancer Prediction with Medical Knowledge on Chinese PopulationDandan Liu, Jun Liao, Li Liu. 1225-1230 [doi]
- A Classification Method and Implementation of Trojan and BotNet Infected User Based on Threat Matrix ModelXiaoping Dai, Li Yao. 1231-1236 [doi]
- A Practical Differentially Private Support Vector MachineFeifei Xu, Jia Peng, Ji Xiang, Daren Zha. 1237-1242 [doi]
- Differential Attribute Desensitization System for Personal Information ProtectionJia Peng, Xin Huang, Min Li, Jiacheng Zhang, Yifei Zhang, Neng Gao. 1243-1248 [doi]
- PPSI: Practical Private Set Intersection Over Large-Scale DatasetsShuo Qiu, Zekun Dai, Daren Zha, Zheng Zhang, Yanan Liu. 1249-1254 [doi]
- Fast Algorithms on Primality Testing for Numbers 255 ⋅ 2^n ± 1Dandan Huang, Zheng Zhang, Zhihao Tang. 1255-1258 [doi]
- Performance and Endurance Training for Equine Racing (PETER)Yousef Al Tawil, Wathiq Mansoor, Shadi Atalla, Husameldin Mukhtar, Kamarul Faizal Bin Hashim, Sami Miniaoui. 1259-1262 [doi]
- Data Science Tools for Crime Investigation, Archival, and AnalysisKarl Biron, Wathiq Mansoor, Sami Miniaoui, Shadi Atalla, Husameldin Mukhtar, Kamarul Faizal Bin Hashim. 1263-1266 [doi]
- Abstracting Syntactic Privacy Notions via Privacy GamesRobin Ankele, Andrew Simpson. 1267-1274 [doi]
- Analysing and Evaluating Syntactic Privacy Games via a Recommender Systems Case StudyRobin Ankele, Andrew Simpson. 1275-1282 [doi]
- A Privacy-Preserving Coalition Loyalty ProgramKok Seng Wong, Myung Ho Kim. 1283-1288 [doi]
- Segmental Symbolic Execution Based on ClusteringRui Ma 0004, Haoran Gao, Bowen Dou, Xiajing Wang, Changzhen Hu. 1289-1296 [doi]
- Energy Optimization of Streaming Applications in IoT on NoC Based Heterogeneous MPSoCs using Re-Timing and DVFSHaider Ali, Umair Ullah Tariq, Lu Liu, John Panneerselvam, Xiaojun Zhai. 1297-1304 [doi]
- Research on a Multi-Level Combination of Software Defect Localization MethodPeng Wang, Chun Shan, Shanshan Mei, Ning Li. 1305-1311 [doi]
- Convolution Neural Network Development Support System using Approximation Methods to Evaluate Inference Accuracy and Memory Usage in an Embedded SystemToki Matsumoto, Yukikazu Nakamoto, Ryota Yamamoto, Shinya Honda, Kazutoshi Wakabayashi. 1312-1317 [doi]
- My Voiceprint Is My Authenticator: A Two-Layer Authentication Approach Using Voiceprint for Voice AssistantsYun-Tai Chang, Marc J. Dupuis. 1318-1325 [doi]
- Software Defect Prediction Model Based On KPCA-SVMYan Zhou, Chun Shan, Shiyou Sun, Shengjun Wei, Sicong Zhang. 1326-1332 [doi]
- Intelligent Resource Discovery in Inter-Cloud using BlockchainMekhla Sharma, Jaiteg Singh, Ankur Gupta. 1333-1338 [doi]
- A Vulnerability Detection Model for Java Systems Based on Complex NetworksLing Xiong, Chun Shan, Changzhen Hu, Zijun Yun, Wenjie Xiong 0002. 1339-1347 [doi]
- Toward Interactional Trust for Humans and Automation: Extending InterdependenceYosef Razin, Karen M. Feigh. 1348-1355 [doi]
- AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D CommunicationsMingjun Wang, Zheng Yan, Bin Song, Mohammed Atiquzzaman. 1356-1362 [doi]
- Analysis Space Reduction with State Merging for Ensuring Safety Properties of Self-Adaptive SystemsKazuya Aizawa, Kenji Tei, Shinichi Honiden. 1363-1370 [doi]
- Privacy and Security Aspects on a Smart City IoT PlatformClaudio Badii, Pierfrancesco Bellini, Angelo Difino, Paolo Nesi. 1371-1376 [doi]
- Joint Beacon Power and Rate Control for Vehicular Ad Hoc NetworksForough Goudarzi, Hamid Asgari, Hamed S. Al-Raweshidy, Evtim Peytchev. 1377-1383 [doi]
- Framework for Analysis and Prediction of NBA Basketball Plays: On-Ball ScreensAndrew Yu, Sun Sunnie Chung. 1384-1391 [doi]
- Learning Constraint-Based Model for Detecting Malicious Activities in Cyber Physical SystemsAndrea Balogh, Deepak Mehta, Piotr Sobonski, Alieldin Mady, Satyanarayana Vuppala. 1392-1399 [doi]
- Automatic Feature Extraction and Selection For Machine Learning Based Intrusion DetectionJinjie Liu, Sun Sunnie Chung. 1400-1405 [doi]
- Satellite Network Load Balancing Strategy for SDN/NFV Collaborative DeploymentChengsheng Pan, Jinjin Shi, Li Yang, Zhixiang Kong. 1406-1411 [doi]
- The Spread of Disinformation on the Web: An Examination of Memes on Social NetworkingMarc J. Dupuis, Andrew Williams. 1412-1418 [doi]
- Research on the Destructive Capability Metrics of Common Network AttacksZiyi Jia, Chensi Wu, Yuqing Zhang. 1419-1424 [doi]
- A Security Formal Model for Multiple Channels CommunicationYulong Fu, Xinyi Yuan, Ke Wang, Zheng Yan, Hui Li. 1425-1430 [doi]
- A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole AttacksYulong Fu, Guoquan Li, Mohammed Atiquzzaman, Zheng Yan 0002, Jin Cao, Hui Li. 1431-1436 [doi]
- Design Patterns for Compensating Controls for Securing Financial SessionsMarc J. Dupuis, Camelia Bejan, Matt Bishop, Scott David, Brent Lagesse. 1437-1443 [doi]
- Security Analysis of Smart Home Based on Life CycleYuhang Mao, Xuejun Li, Yan Jia, Shangru Zhao, Yuqing Zhang. 1444-1449 [doi]
- Research on the Impact of Attacks on Security CharacteristicsChensi Wu, Weiqiang Xie, Su Yang, Shangru Zhao, Huiyang Shi, Yuqing Zhang, Ziyi Jia. 1450-1455 [doi]
- Attack-Defense Utility Quantification And Security Risk AssessmentSu Yang, Chensi Wu, Yuqing Zhang, Wenjie Wang, Weiqiang Xie. 1456-1461 [doi]
- An Experimental Online Judge System Based on Docker Container for Learning and Teaching AssistanceYibo Han, Zheng Zhang, Bo Yuan, Haixia Bi, Mohammad Nasir Shahzad, Lu Liu 0001. 1462-1467 [doi]
- Boosting Domestic Energy Efficiency Through Accurate Consumption Data CollectionAbdullah Alsalemi, Mona Ramadan, Faycal Bensaali, Abbes Amira, Christos Sardianos, Iraklis Varlamis, George Dimitrakopoulos. 1468-1472 [doi]
- Cloud Computing in Government Organizations-Towards a New Comprehensive ModelNaif Al Mudawi, Natalia Beloff, Martin White. 1473-1479 [doi]
- IoT-Based Fall and ECG Monitoring System: Wireless Communication System Based Firebase Realtime DatabaseAyman Al-Kababji, Lisan Shidqi, Issam Boukhennoufa, Abbes Amira, Faycal Bensaali, Mohamed Sadok Gastli, Abdulah Jarouf, Walid Aboueata, Alhusain Abdalla. 1480-1485 [doi]
- Review of Innovative Cyberspace Security Research Inspired by Bionics Computing MethodsJianfeng Chen, ChunLin Li, Zhihong Rao, Rui Xu, Chunhui Hu. 1486-1493 [doi]
- A Mobile Edge Computing Architecture for Safety in Mining IndustryLiangcai Fang, Chungui Ge, Guolin Zu, Xinkun Wang, Weiguo Ding, Changliang Xiao, Liang Zhao 0004. 1494-1498 [doi]
- Research on User Behavioral Intention Based on Telecommunication DataYuhui Han, Dengsheng Fu, Liang Zhao 0004, Chen Cheng, Xinzhou Cheng, Lexi Xu. 1499-1504 [doi]
- Collision Evaluation in Low Power Wide Area NetworksRiyadh A. Abbas, Ali Al-Sherbaz, Abdeldjalil Bennecer, Phil D. Picton. 1505-1512 [doi]
- 5G Wireless Networks Meet Big Data Challenges, Trends, and ApplicationsChangbo Zhu, Xinzhou Cheng, Haina Ye, Jianjian Yang, Lexi Xu, Kun Chao. 1513-1516 [doi]
- Telecom Big Data Based Precise User Classification SchemeYuwei Jia, Kun Chao, Xinzhou Cheng, Lexi Xu, Xueqing Zhao, Lin Yao. 1517-1520 [doi]
- A Comprehensive Operation and Revenue Analysis Algorithm for LTE/5G Wireless System Based on Telecom Operator DataLexi Xu, Xueqing Zhao, Yanli Yu, Yuting Luan, Liang Zhao 0004, Xinzhou Cheng, Kun Chao, Yuwei Jia, Yuhui Han, Haina Ye. 1521-1524 [doi]
- A Precise Pollution Prevention and Control Method Based on Telecom Operator DataKun Chao, Di Ge, Lexi Xu, Liang Zhao 0004, Yuwei Jia, Xinzhou Cheng. 1525-1528 [doi]
- Data Flow Management and Visual Analytic for Big Data Smart City/IOTPierfrancesco Bellini, Francesco Bugli, Paolo Nesi, Gianni Pantaleo, Michela Paolucci, Imad Zaza. 1529-1536 [doi]
- Multiprocessor Task Programming and Flexible Load Balancing for Time-Stepping Methods on Heterogeneous Cloud InfrastructuresThomas Rauber, Gudula Rünger. 1537-1544 [doi]
- A Novel Meta-Heuristic for Green Computing on VFI-NoC-HMPSoCsUmair Ullah Tariq, Haider Ali, Lu Liu, Xiaojun Zhai. 1545-1552 [doi]
- Integration of Apache Spark with Invasive Resource ManagerJeeta Ann Chacko, Isaías A. Comprés Ureña, Michael Gerndt. 1553-1560 [doi]
- Decentralized Parallel Any Colony Optimization for Distributed Memory SystemsHuw Lloyd. 1561-1567 [doi]
- QARPF: A QoS-Aware Active Resource Provisioning Framework Based on OpenStackWeichao Ding, Fei Luo, Chunhua Gu, Haifeng Lu. 1568-1576 [doi]
- Graph Data Modelling for Genomic VariantsSanna Aizad, Ashiq Anjum. 1577-1584 [doi]
- A Novel Relationship Extraction Scheme Based on Negative Feedback AttentionWeidong Li, Jing Liu, Jun Tie, Zimao Li, Jun Qin, Lu Liu. 1585-1589 [doi]
- Based on Super-Pixels to Simulate Water Ripples from a Single ImageZhu Li, Zheng Ruojun, Li Jun, Ran Lin, Yu Ya, Guo Li, Hu Tao. 1590-1594 [doi]
- Persistent Cooperative Monitoring System of Disaster Areas Using UAV NetworksTaku Noguchi, Yosuke Komiya. 1595-1600 [doi]
- Improved Procedures for Training Primal Wasserstein GANsTao Zhang, Zhongnian Li, Qi Zhu 0001, Daoqiang Zhang. 1601-1607 [doi]
- Unsupervised Domain Adaptation for Multi-Center Autism Spectrum Disorder IdentificationYou Jiang, Zhongnian Li, Daoqiang Zhang. 1608-1613 [doi]
- The Function Extension Method for SDN Controller Based on LightGBMLi Yang, Peng Yang, Debin Wei, Huaifeng Shi. 1614-1619 [doi]
- Optimal RTS Threshold for IEEE 802.11 WLANs: Basic or RTS/CTS?Yachao Yin, Yayu Gao, Sohaib Manzoor, Xiaojun Hei. 1620-1625 [doi]
- Towards Accurate and Robust Fall Detection for the Elderly in a Hybrid Cloud-Edge ArchitectureKazi Md Shahiduzzman, Junqing Peng, Yayu Gao, Xiaojun Hei, Wenqing Cheng. 1626-1631 [doi]
- A Novel Task Offloading Framework to Support Wireless Body Area Networks with MECYangzhe Liao, Liqing Shou, Quan Yu, Xiaojun Zhai, Qingsong Ai, Quan Liu. 1632-1637 [doi]
- LTE-LAA and WiFi in 5G NR Unlicensed: Fairness, Optimization and Win-Win SolutionYayu Gao. 1638-1643 [doi]
- Energy-Efficient Base Station Deployment in Heterogeneous Communication NetworkXueyan Chen, Kehao Wang, Jihon Yu, Lin Chen, Pan Zhou. 1644-1649 [doi]
- Storage-Repair Tradeoff for Hierarchical Distributed Storage SystemsQuan Yu, Xinyi Zeng, Yangzhe Liao, Qingsong Ai. 1650-1654 [doi]
- QoE Oriented Adaptive Streaming Method for 360° Virtual Reality VideosYi Han, Yafeng Ma, Yangzhe Liao, Gabriel-Miro Muntean. 1655-1659 [doi]
- Investigating Network Services Abstraction in 5G Enabled Device-to-Device (D2D) CommunicationsEd Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Loo. 1660-1665 [doi]
- Security and Forensics Challenges to The MK Smart ProjectEbenezer Okai, Xiaohua Feng, Paul Sant. 1666-1670 [doi]
- Consideration and Research on Data Architecture for the Future Cyber SocietyFang Miao, Wenhui Yang, Yan Xie, Wenjie Fan. 1671-1676 [doi]
- Challenges in ROS ForensicsIroshan Abeykoon, Xiaohua Feng. 1677-1682 [doi]
- Extracting Reliable Health Condition and Symptom Information to Support Machine LearningHong Qing Yu. 1683-1687 [doi]
- Autonomous Vehicles' Forensics in Smart CitiesXiaohua Feng, Edward Swarlat Dawam, Dayou Li. 1688-1694 [doi]
- Computer Laws Consideration on Smart City Data Planning of Chongli 2022Xiaohua Feng, Yunzhong Feng, Junke Xu, Shu Sun, Yuping Zhao. 1695-1699 [doi]
- Finger-Drawn Signature Verification on Touch Devices Using Statistical Anomaly DetectorsMudhafar M. Al-Jarrah, Shawq S. Al-Khafaji, Saad Amin, Xiaohua Feng. 1700-1705 [doi]
- Analyzing the Validation Flaws of Online Shopping Systems Based on Coloured Petri NetsWangyang Yu, Lu Liu, Yisheng An, Xiaojun Zhai. 1706-1710 [doi]
- A Privacy-Preserved Probabilistic Routing Index Model for Decentralised Online Social NetworksBo Yuan, Jiayan Gu, Lu Liu. 1711-1716 [doi]
- Data Aggregation Challenges in Fog ComputingMohammad Shahzad, John Panneerselvam, Lu Liu, Xiaojun Zhai. 1717-1721 [doi]
- A Method of Chinese Tourism Named Entity Recognition Based on BBLC ModelLeyi Xue, Han Cao, Fan Ye, Yuehua Qin. 1722-1727 [doi]
- Discriminant Subspace Alignment for Cross-Project Defect PredictionZhiqiang Li, Chao Qi, Li Zhang, Jie Ren. 1728-1733 [doi]
- Behavioural Smoking Identification via Hand-Movement DynamicsBenouis Mohamed, Maryam Abo-Tabik, Yael Benn, Olivia Salmon, Alex Barret-Chapman, Nicholas Costen. 1734-1739 [doi]
- Persuade Me!: A User-Based Recommendation System ApproachRubén Sánchez-Corcuera, Diego Casado Mansilla, Cruz E. Borges, Diego López-de-Ipiña. 1740-1745 [doi]
- Decision Tree Model of Smoking BehaviourMaryam Abo-Tabik, Nicholas Costen, John Darby, Yael Benn. 1746-1753 [doi]
- A Hybrid Human-Robot Collaborative Environment for Recycling Electrical and Electronic EquipmentApostolos Axenopoulos, Georgios Th. Papadopoulos, Dimitrios Giakoumis, Ioannis Kostavelis, Alexis Papadimitriou Papadimitriou, Sara Sillaurren, Leire Bastida, Ozgur Oguz, Dirk Wollherr, Eugenio Garnica, Vasiliki Vouloutsi, Paul F. M. J. Verschure, Dimitrios Tzovaras, Petros Daras. 1754-1759 [doi]
- Towards a Human-Centered Model in SIoT -Enhancing the Interaction Behaviour of Things with Personality TraitsDaniel Defiebre, Panagiotis Germanakos. 1760-1767 [doi]
- eSports Pro-Players Behavior During the Game Events: Statistical Analysis of Data Obtained Using the Smart ChairAnton Smerdov, Evgeny Burnaev, Andrey Somov. 1768-1775 [doi]
- AI-Powered Tangible Interfaces to Transform Children's Mental Well-BeingKieran Woodward, David J. Brown 0001, Eiman Kanjo. 1776-1782 [doi]
- Evaluation of an IoT Framework for a Workplace Wellbeing ApplicationNithya G. Nair, Ahmed Saeed, Md. Israfil Biswas, Mamun I. Abu-Tair, Pushpinder-Kaur Chouhan, Ian Cleland, Joseph Rafferty, Chris D. Nugent, Philip J. Morrow, Mohammad Hossein Zoualfaghari, Zhan Cui. 1783-1788 [doi]
- Dynamically Programmable Virtual Profiles as a ServiceAlejandro Pérez-Vereda, Juan Manuel Murillo, Carlos Canal. 1789-1794 [doi]
- Parameter Optimization for Deriving Bluetooth-Based Social Network GraphsBojan Simoski, Michel C. A. Klein, Eric Fernandes de Mello Araújo, Aart Tijmen van Halteren, Thabo van Woudenberg, Kirsten E. Bevelander, Moniek Buijzen, Henri E. Bal. 1795-1803 [doi]
- Towards Understanding of eSports Athletes' Potentialities: The Sensing System for Data Collection and AnalysisAlexander Korotin, Nikita Khromov, Anton Stepanov, Andrey Lange, Evgeny Burnaev, Andrey Somov. 1804-1810 [doi]
- Redefining Micro-Moments for Improving Energy Behaviour: The SIT4Energy ApproachKonstantinos Peppas, Adamantia Chouliara, Apostolos Tsolakis, Stelios Krinidis, Dimitrios Tzovaras. 1811-1816 [doi]
- A Socio-Economic Survey for Understanding Self-Perceived Effectiveness of Persuasive Strategies Towards Energy Efficiency in Tertiary BuildingsDimitris Papageorgiou, Diego Casado Mansilla, Apostolos C. Tsolakis, Cruz E. Borges, Diego López-de-Ipiña, Oihane Kamara Esteban, Rubén Sánchez-Corcuera, Ioannis Moschos, Ane Irizar-Arrieta, Stelios Krinidis, Angeliki Zacharaki, Jose Manuel Ávila, Dimitrios Tzovaras. 1817-1824 [doi]
- Going Back for That One Last Thing in the House on Fire: How Fear, Attentiveness, Sadness, Joviality, and Other Lower Order Dimensions of Affect Influence Our Security and Privacy BehaviorMarc J. Dupuis. 1825-1833 [doi]
- Facebook vs. Twitter: An Examination of Differences in Behavior Type and Substance Based on Psychological FactorsMarc J. Dupuis, Seth Pham, Maximilian Weiß. 1834-1840 [doi]
- Veterans and Their Inherent Cybersecurity Preparedness: Myth or Reality?Marc J. Dupuis, Maximilian Weiß. 1841-1845 [doi]
- The People Perspective: Categorization and Controversial Information in WikipediaMassimo Marchiori, Enrico Bonetti Vieno, Matteo Botticchia. 1846-1853 [doi]
- Combining Human and Machine Intelligence to Foster Wider Adoption of e-ServicesKoldo Zabaleta, Ana Belen Lago, Diego López-de-Ipiña, Giuseppe Di Modica, Raúl Santos de La Cámara, Marco Pistore. 1854-1859 [doi]
- IoT in Smart Cities: Exploring Information Theoretic and Deep Learning Models to Improve Parking SolutionsPiyush Sharma, Adrienne Raglin. 1860-1865 [doi]
- Abductive Causal Reasoning for Internet of ThingsAdrienne Raglin, Anshuman Venkateswaran, Huan Liu 0001. 1866-1869 [doi]
- Extensible Environment for Monitoring and Detecting Symptoms of DepressionEnrique Moguel, Javier Berrocal, José García-Alonso, Daniel Flores-Martín, Jaime Galán-Jiménez, Juan Manuel Murillo. 1870-1875 [doi]
- Complementing Travel Itinerary Recommendation Using Location-Based Social NetworksJing Zhou, Yajie Gu, Weiguo Lin. 1876-1881 [doi]
- Development of Huffman Code for Lora TechnologyPramoth Pongpunpurt, Weerawat Khawsuk, Nikorn Sutthisangiam. 1882-1887 [doi]
- Road Traffic Event Detection Using Twitter Data, Machine Learning, and Apache SparkEbtesam Alomari, Rashid Mehmood, Iyad Katib. 1888-1895 [doi]
- Millimeter-Wave Multi-Radar System for Ubiquitous Concealed Dangerous Object DetectionYi Xu, Xin Di, Zhaoyu Zhang, Lei Li, Jun Tian. 1896-1900 [doi]
- SIVEQ: An Integrated System for the Valorization of Surplus FoodDavide Scazzoli, Giulia Bartezzaghi, Annalaura Silvestro, Maurizio Magarini, Marco Melacini, Giacomo Verticale. 1901-1907 [doi]
- Impact Analysis of Erroneous Data on IoT ReliabilitySamuel Moore, Chris D. Nugent, Ian Cleland, Shuai Zhang 0001. 1908-1915 [doi]
- An Analysis of the Impact of Uncertainty on the Internet of Things: A Smart Home Case StudyTazar Hussain, Chris D. Nugent, Adrian Moore, Jun Liu. 1916-1921 [doi]
- Building Smart City Drone for Graffiti Detection and Clean-upShuqin Wang, Jerry Zeyu Gao, Weiyi Li, Yanning Li, Kaixuan Wang, Shengqiang Lu. 1922-1928 [doi]
- Health Zone Monitoring: A Passive ApproachMassimo Marchiori. 1929-1936 [doi]
- Follow-me Prefetching for Video Streaming Over Mobile Edge Computing NetworksIbrahim Mohammedameen, Is-Haka Mkwawa, Lingfen Sun. 1937-1942 [doi]
- Swarm Wisdom for Smart Mobility - The Next Generation of Autonomous VehiclesAisha Naseer, Mona Jaber. 1943-1949 [doi]
- The Impact of Bike-Sharing Ridership on Air Quality: A Scalable Data Science FrameworkDiane Woodbridge, Nina Hua, Victoria Suarez, Rebecca Reilly, Philip Trinh, Paul Intrevado. 1950-1957 [doi]
- Distributed Data Analytics Framework for Cluster Analysis of Parking ViolationNan Lin, Evan Liu, Fiorella Tenorio, Xi Yang, Diane Woodbridge. 1958-1963 [doi]
- A Review of IoT Service Provision to Assess the Potential for System Interoperability in an Uncertain EcosystemCathryn Peoples, Kashif Rabbani, Mamun I. Abu-Tair, Bin Wang, Philip J. Morrow, Adrian Moore 0001, Joseph Rafferty, Sally I. McClean, Mohammad Hossein Zoualfaghari, Parag G. Kulkarni. 1964-1971 [doi]
- Recovering Decentralized Critical Archival Data From Tampering in Smart City Environment Using BlockchainVineet Mishra, Stephen S. Yau, Chandralekha Yenugunti. 1972-1977 [doi]
- Dynamic Cloud Service Management for Scalable Internet of Things ApplicationsAlexandros Mavromatis, Sam Gunner, Theo Tryfonas, Dimitra Simeonidou. 1978-1982 [doi]