default search action
ICIT 2019: Shanghai, China
- ICIT 2019 - The 7th International Conference on Information Technology: IoT and Smart City, Shanghai, China, December 20-23, 2019. ACM 2019, ISBN 978-1-4503-7663-1
Machine Learning Algorithms and Applications
- Huiyu Liu, Owolabi Ganiyat O., Sung-Ho Kim:
Automatic Classifications and Recognition for Recycled Garbage by Utilizing Deep Learning Technology. 1-4 - Haodong Yang, Wenge Rong, Zhang Xiong:
Open-Domain Dialogue Generation: Presence, Limitation and Future Directions. 5-12 - Yao Wu, Zuochang Ye, Yan Wang:
A Damage Identification System Based on Deep Learning. 13-17 - Makoto Mizuno, Tatsuhito Hasegawa:
Deep Metric Learning for Sensor-based Human Activity Recognition. 18-23 - Marshall, Jang-Sik Park, Jong-Kwan Song:
Gas Leak Segmentation Comparison Using Different Activation Function on Fully Convolutional Network. 24-28
Data Analysis and Processing
- Xiaohong Yu, Yu-Che Huang, Yu-Ling Chang:
A Study on the Establishment of a User's Product Attribute Requirement Data Verification Model. 29-33 - Qinxian Liu, Youyung Hyun, Ryuichi Hosoya, Taro Kamioka:
How Big Data Analytics Impacts Agility: The Moderation Effect of Orientation of Interactive Team Cognition. 34-39 - Chen Sun, Yunjie Zhang, Yiwei Liu:
Multi-level Data Filter for Speaker Recognition on Imbalanced Datasets. 40-44 - Jeanie R. Delos Arcos, Alexander A. Hernandez:
Analyzing Online Transaction Data using Association Rule Mining: Misumi Philippines Market Basket Analysis. 45-49 - Aiting Xu, Yingying Zhou, Hui Chen:
Research on Customer Deposit Order Based on Data Mining Technology. 50-53 - Chenggong Zhai, Xiande Fei, Zhiwei Yang:
Design of Integrated Platform for Clothing and Accouterment Support Based on Big Data. 54-58
Text Analysis and High-Performance Computing
- Ding Pan, Zhuoqian Liang, Yuan Deng:
Text Analysis of Enterprise Financial Report Based on Semantic Perception. 59-64 - Guangkun Zhai, Yue Zhou:
Component Deformation Measurement Based on Point Cloud. 65-69 - Salintip Ratsamano, Supaporn Chairungsee:
Knowledge-Based Ontology Development for Folk Medicine. 70-74 - Jun Wang, Bin Ge, Chunhui He:
Domain Neural Chinese Word Segmentation with Mutual Information and Entropy. 75-79 - Rhodessa J. Cascaro, Bobby D. Gerardo, Ruji P. Medina:
Aggregating Filter Feature Selection Methods to Enhance Multiclass Text Classification. 80-84 - Surangkanang Charoenrak, Supaporn Chairungsee:
Algorithm for Palindrome Detection by Suffix Heap. 85-88 - Siyu Sun, Yingjie Gai, Yingying Zhou, Aiting Xu:
Research on User Comments of Douban Animation Made in China Based on Text Mining Technology. 89-93 - Minghui Yang, Linlin Zhang:
Research of Cross-domain Cloud Trust Model and its Defense Abilities Analysis. 94-97 - Kangle Wang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao:
An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud Computing. 98-102 - Sarun Wiriyapistan, Sukree Sinthupinyo:
Extracting Structured Data from Unstructured Text Using Conditional Random Field and Jaccard Similarity. 103-106
Soft Computing and Algorithms
- Shuang Yuan, Yanfang Fan, Ying Cai:
A Survey on Computation Offloading for Vehicular Edge Computing. 107-112 - Zhenhua Zhang, Wei Zhu, Wei Zhong, Yi Zhuang:
Load Forecasting model of Mobile Cloud Computing Based on Glowworm Swarm Optimization LSTM Network. 113-119 - Kairu Li, Yongyu Wu, Jia Tian, Wentao Tian, Zuochang Ye:
Distributed Deep Neural Network Training with Important Gradient Filtering, Delayed Update and Static Filtering. 120-125 - Liangding Li, Jiapeng Chi, Jun Wang:
Applying LSTM to Enable Cache Prefetching to Optimize Flow Table Update Efficiency in SDN Switches. 126-130 - Ning Fei, Yangyang Zhang:
Movie genre classification using TF-IDF and SVM. 131-136 - Mingwei Leng, Tao Ma:
Semi-supervised Community Detection: A Survey. 137-140 - Jinsheng Wu, Zhonghong Ou, Meina Song:
Session-based Recommendation with Context-Aware Attention Network. 141-146
Software Design and Development
- Chung-Shun Feng, Tsu-Wu Hu, Yi-Ru Chen, Chu-Yin Tsai:
Research on Improving the User Experience and Usability Evaluation of Tomato Work Method App-Using Forest App. 147-151 - Supparang Ruangvanich, Pallop Piriyasurawong:
Key Success of Technology Acceptance to Develop Mobile Application. 152-157 - Peng Shan, Qingbao Li, Ping Zhang, Yanyang Gu:
Malware Detection Method based on Control Flow Analysis. 158-164 - Tsu-Wu Hu, Chung-Shun Feng, Chia-Cheng Hsu, Cheng-Yu Liu:
Research on Interface Improvement of English Vocabulary Learning APP. 165-169 - Dongming Jiang, Yuan Jiang:
Java Session Language: A Session-Based Language for Cloud Service Composition. 170-174
Object Detection and Pattern Recognition
- Shaoting Li, Kai Sun, Meijing Qi, Jiahui Liu:
Design of Beverage Packaging Identification and Recycling System Based on Zedboard. 175-180 - Yong Zhang, Kangle Xu, Yujie Wang:
WiNum: A WIFI Finger Gesture Recognition System Based on CSI. 181-186 - ZhiMing Liu, Ming Shao, Jin Wang, Kaide Li, Yaonong Wang, Miao Cheng:
Exclusion-Net: Accurate Detection Algorithm for Crowd Objects. 187-191 - Zhenyu Dai, Kai Sun, Jin Li, Wei Huang:
Implementation of Dairy Cows Individual Identification Based on ZYNQ SoC. 192-196 - Kai Wang, Guanyi Zhan, Wai Chen:
A New Approach for IoT-based Fall Detection System using Commodity mmWave Sensors. 197-201 - Zhi Xia, Qi Li, Lu Ma, Haodong Han:
High Accuracy Time Difference Measurement of the Periodic Pulse Signal with the Stochastic Resonance Filtering. 202-205 - Wenbo Cheng, Qibo Sun, Yasheng Zhang:
Edge Assisted Object Detection for Mobile Application. 206-211 - Zhen Wang, Shixian Luo, He Sun, Huadong Pan, Jun Yin:
An Efficient Non-local Attention Network for Video-based Person Re-identification. 212-217 - Jin Li, Wei Huang, Zhenyu Dai, Xiaowen Bian:
Implementation of Biometrics Recognition System Based on Zynq SoC Platform and Cloud Server. 218-222
Image Processing Technology and Method
- Deqiang Fu, Ning Li, Yingwei Zhou:
The Influence of Light Environment on Eye-Control Human-Computer Interaction. 223-227 - Jialiang Zhang, Wenting Fu, Jianying Wang, Ling Guo:
Aerial Visual Information Acquisition System Based on EEG Control. 228-233 - Wu Yin, Chen Zhao, Yutian Chen:
Germplasm Selection Based on Machine Vision. 234-237 - Meijing Qi, Wei Huang, Shaoting Li, Pei Zhou:
Video Dynamic Target Processing Method Based on FPGA. 238-242 - Kuang Xin, An Ling Wang, Shi-Ke Li, Lei Guo, Jian-Ping Pang, Zhi Yue Liu, Fu Ping Liu:
Watermark Embedding and Extraction Based on LSB and Four-Step Phase Shift Method. 243-247 - Guilin Chen, Guanwu Wang, Jian Ju, Xianglin Wei:
Research on the Influence of Kmeans Cluster Preprocessing on Adversarial Images. 248-252 - Jieli Peng, Yang Cao, Zhiming Ding, Jin Yan:
A Fast Real-time Map-Matching for Unstable Sampling-rate GPS Trajectories. 253-258 - Yingjun Ma, Jinshuo Zhang, Dongmei Niu, Muhammad Umair Hassan, Xiuyang Zhao:
An Unsupervised Approach for 3D Medical Image Registration. 259-263 - Zhiyue Liu, Anling Wang, Xiaofeng Zhu, Fuping Liu:
Computational Holographic Image Watermarking Algorithm Based on Discrete Cosine Transform. 264-269
Mobile Communication and Data Transmission
- Wanping Liu:
Multi-Layer 3D MIMO Precoding Algorithm Based on Partitioned Regions. 270-274 - Ting Ma, Feng Hu, Maode Ma:
Securing 5G HetNets Using Mutual Physical Layer Authentication. 275-278 - Jiemin Yang, Xiangqian Ding, Liangang Zhang, Jiancheng Lin:
Design of Intelligent Container Terminal Communication System Based on 5G Technology. 279-282 - Yusheng Hao, Jincheng Li, Weilan Wang, Qiang Lin:
An Animal Respiration Monitoring System Based on Channel State Information of Wi-Fi Network. 283-289 - Hui Guo, Song-bo Ji:
Improvement of Congestion Control Algorithms for Streaming Media TFRC. 290-293 - Bo-Sung Kim, JooSeok Song:
Pseudonymous Mobile Node Reauthentication Scheme for Mobile Wireless Sensor Networks. 294-299 - Longdy Torn, Ammar Hawbani, Xingfu Wang, Omar Busaileh, Muhammad Umar Farooq:
Heuristic Routing with Infrastructure Nodes for Data Dissemination in Vehicular Networks. 300-304 - Li Qing, Fu Xuan-li, Hou Yu-ke, He Wan-jie:
Super-peer Selection Algorithm Based on AHP in Mobile Peer-to-Peer Network. 305-309 - Xiaochun Su, Yanheng Liu, Jian Wang:
Joint Optimization QoS and Security of Wireless Communication Networks. 310-316 - Gbenga Oladosu, Chunling Tu, Pius Adewale Owolawi:
Optimized Handover Algorithm for Vehicular Ad hoc Network. 317-321 - Yuye Zhou, Dongmei Zhang:
Double Mix-Zone for Location Privacy in VANET. 322-327
Internet of Things and Information Network
- Haipeng Zhang, Ningning Lu, Hucheng Sun, Jie Li, Ruiliang Song:
A Novel Dynamic Energy Model for the Energy-Harvesting IoT Node. 328-333 - Wentong Zhang, Chi Cheng, Sheng Zhang:
NSIIC: A Novel Framework for Nodes' Smart Connection Oriented to Collaborative IoT. 334-337 - Lalita Thampibal, Wiwat Vatanawood:
Formalizing Railway Network Using Hierarchical Timed Coloured Petri Nets. 338-343 - Warusia Yassin, Raihana Abdullah, Mohd Faizal Abdollah, Mohd Zaki Mas'ud, Farah Adeliena Bakhari:
An IoT Botnet Prediction Model Using Frequency based Dependency Graph: Proof-of-concept. 344-352 - Linlin Zhang, Xiang Zou, Minghui Yang:
Identity Authentication Chain based on Encrypted Database in Heterogeneous Alliance Network. 353-356 - Yuto Egawa, Yoshiaki Taniguchi, Nobukazu Iguchi:
A Study on Function for Grasping Location of Device in an IoT Device List Visualization System. 357-361 - Muhammad Bilal, Zhi Yu, Abid Bashir, Muhammad Ali Hussain:
Awareness and Settlement of IT Field Key Challenges for Next Generation Development in World. 362-368 - Xuwang Teng, Jingyang Lyu:
An Adaptive Network Concurrent Service Scheme in Single-machine Scenario. 369-372 - Serge Volkov:
City Services Management Methodology Based on Socio-Cyber-Physical Approach. 373-376
Computer and Business Intelligence
- Xueliang Han, Huifang Wu:
BI&A Capability: A Discussion on the Mechanism of Enterprise's Performance Improvement. 377-382 - Yu Shan, Dejun Xie, Rui Zhang:
A Multi-Objective Optimization Model for Bike-Sharing. 383-387 - Fang-Cih Lin, Tzh-Han Weng, Hai-Yen Chang, Fu-Ming Lai, Wei-Ling Kung, Yi-Hsien Wang:
An Analysis of IPOs Short and Long-Term Effect of E-commerce Companies among China A-share, Hong Kong, and U.S. Market. 388-392 - Jixuan Leng, Yunfei Feng, Jiaxuan Wu, Junteng Li:
Overview of Cashier-Free Stores and a Virtual Simulator. 393-399 - Ying Li, Guihang Guo:
Retailer's Ordering Decision with Overconfident Consumers. 400-403 - Ding Pan, Zhuoqian Liang, Yuan Deng:
Textual Information Extraction Model of Financial Reports. 404-408 - Qilu Wu, Yonglu Zhang, Fan Xu:
Application of Crime Related Index Model in Violence Related Cases. 409-413 - Tao Huang, Ran Tian, Lifang Niu, Shujian Xiang:
Analysis of Research Hotspots in the Field of Sharing Economy in China: Based on Co-word Analysis and Social Network Analysis. 414-418 - Guihang Guo, Ying Li, Siqi Zheng:
Factors Influencing University Students' Intention to Redeem Digital Takeaway Coupons - Analysis Based on A Survey in China. 419-425
Bioinformatics and Computational Biology
- Tida Butrak, Supaporn Chairungsee:
A Linear Time Algorithm for Finding Tandem Repeat in DNA Sequences. 426-429 - Ziqi Li, Xiao Ma, Meizhen Liu:
Motion Monitoring for Limb Exercise. 430-434 - Donghyeon Kim, Younglo Lee, Hanseok Ko:
Multi-task Learning for Animal Species and Group Category Classification. 435-438 - Patsaraporn Somboonsak:
Time Series Analysis of Dengue Fever Cases in Thailand Utilizing the SARIMA Model. 439-444 - Hong-In Cheng, Rizky Alifa, Haegoo Lee:
The Effectiveness of Music Therapy System for the Elderly with Mild Cognitive Impairment. 445-448 - Farzaneh Elahifasaee, Manhua Liu, Ming Yang:
Nonlinear Discriminant Analysis for MR Brain Images Classification via Kernel Function. 449-452
Electronic Information Engineering and Technology
- Dharmendra Singh Rajput, Rajesh Kaluri, Harshita Patel:
Security Threat Assessment of Aircraft System using FSS. 453-457 - Chungu Lee, Taesic Kim, Jonghoon Kim, Joung-Hu Park:
Available Discharge Capacity Estimation According to C-rate Variation of Second-Used Battery. 458-462 - Jiawei Zhu, Qiang Liao, Yishuai Lin, Weidong Lei, Jingjie Gao:
A High-Resolution Model for Simulation of Flexible Residential Electricity Demand. 463-467 - Guo Peng, Wang Cun:
Wind Power Prediction Based on Back Propagation Algorithm with Numerical Weather Prediction. 468-471 - Chunmeng Zhong, Haifeng Zhang, Yidong Yuan, Sukun Zhang, Hai Wan:
Design and Implementation of Distributed Time-Triggered System Based on RT-Thread. 472-476 - Na Song, Xiangzhi Hu, Ning Li:
Anomaly Detection of Wind Turbine Generator Based on Temporal Information. 477-482 - Zhengwen Zhang, Cheng Zhong, Shaoyong Guo, Fengning Wang:
A Master-Slave Chain Architecture Model for Cross-Domain Trusted and Authentication of Power Services. 483-487
Design and Application of Intelligent System
- Weihua Duan, Rouhollah Nasiri, Sasan Karamizadeh:
Smart City Concepts and Dimensions. 488-492 - Yichen Pan, Jaesoo Kim:
Design and Implementation of Intelligent Home Power Control Systems by Using Raspberry Pi and AWS Cloud Service. 493-496 - Satoshi Kobayashi, Ren Katsurada, Tatsuhito Hasegawa:
Estimation of Sidewalk Surface Type with a Smartphone. 497-502 - Santosh Pattar, C. R. Sandhya, Darshil Vala, Rajkumar Buyya, K. R. Venugopal, S. S. Iyenger, L. M. Patnaik:
SoCo-ITS: Service Oriented Context Ontology for Intelligent Transport System. 503-508 - Hemalata Vasudavan, Sumathi Balakrishnan:
The Taxonomy of Smart City Core Factors. 509-513 - GilJong Song, SeocHo Kim, UiYong Jung, NamHyun Yoo:
An Experimental Study on the Modeling System of the Public Bus Traffic Delay Index. 514-520 - Jiemin Yang, Xiangqian Ding, Yongcui Li, Jiancheng Lin:
Research on Automatic Wharf Unmanned Gate System Based on Artificial Intelligence. 521-524 - Maode Ma, Zhaozheng He, Quanqing Xu, Xue Jun Li:
Design and Development of Smart Home Sensing Supported by Blockchain Technology. 525-530
Computer Science and Information Engineering
- Jianying Wang, Shi Fei, Juan Chen:
The Research and Practice of Teaching Model of Electronics and Information Practice Courses Based on Moodle Platform. 531-535 - Minfeng Xu, Shiqing Xin, Changhe Tu:
An Efficient Surface Remeshing Algorithm Based on Centroidal Power Diagram. 536-542 - Bo Huang, Yaling Sun, Dapeng Li:
Dynamic Pricing of Edge Cooperative Offloading Using a Simple Heuristic. 543-547 - Yanxiong Sun, Yeli Li, Qingtao Zeng, Yuning Bian, Xinyu Sun, Linxuan Yu:
Construction of Driving Conditions Based on Multi-segment Clustering Algorithm. 548-553 - Yuhui Yang, Yue Hu:
The Constructing and Application Case of Online Virtual Exhibits Arrangement System for Museum Learning. 554-558 - Li Qin, Zhigang Hao, Liang Zhao:
Food safety Knowledge Graph and Question Answering System. 559-564 - Chikako Sono, Tatsuhito Hasegawa:
Interaction to Support the Learning of Typing for Beginners on Physical Keyboard by Projection Mapping. 565-569 - Tongjuan Wang:
The Information Security Risk Assessment Model Based on Improved Electre Method. 570-574 - Xuebin Jia, Tong Li, Rui Zhu, Zhan Wang, Zehui Zhang, Jiawei Wang:
Traffic Flow Prediction Based on Self-attention Mechanism and Deep Packet Residual Network. 575-580 - R. S. I. Wilson, Athula Ginige, Jeevani S. Goonetillake, Anusha Indika Walisadeera:
User Needs-driven Enrichment of Ontology: A case study in Sri Lankan Agriculture. 581-586
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.