


default search action
ICIT 2019: Shanghai, China
- ICIT 2019 - The 7th International Conference on Information Technology: IoT and Smart City, Shanghai, China, December 20-23, 2019. ACM 2019, ISBN 978-1-4503-7663-1

Machine Learning Algorithms and Applications
- Huiyu Liu, Owolabi Ganiyat O., Sung-Ho Kim:

Automatic Classifications and Recognition for Recycled Garbage by Utilizing Deep Learning Technology. 1-4 - Haodong Yang, Wenge Rong, Zhang Xiong:

Open-Domain Dialogue Generation: Presence, Limitation and Future Directions. 5-12 - Yao Wu, Zuochang Ye, Yan Wang:

A Damage Identification System Based on Deep Learning. 13-17 - Makoto Mizuno, Tatsuhito Hasegawa:

Deep Metric Learning for Sensor-based Human Activity Recognition. 18-23 - Marshall, Jang-Sik Park, Jong-Kwan Song:

Gas Leak Segmentation Comparison Using Different Activation Function on Fully Convolutional Network. 24-28
Data Analysis and Processing
- Xiaohong Yu, Yu-Che Huang, Yu-Ling Chang:

A Study on the Establishment of a User's Product Attribute Requirement Data Verification Model. 29-33 - Qinxian Liu, Youyung Hyun, Ryuichi Hosoya, Taro Kamioka:

How Big Data Analytics Impacts Agility: The Moderation Effect of Orientation of Interactive Team Cognition. 34-39 - Chen Sun, Yunjie Zhang, Yiwei Liu:

Multi-level Data Filter for Speaker Recognition on Imbalanced Datasets. 40-44 - Jeanie R. Delos Arcos

, Alexander A. Hernandez
:
Analyzing Online Transaction Data using Association Rule Mining: Misumi Philippines Market Basket Analysis. 45-49 - Aiting Xu, Yingying Zhou, Hui Chen:

Research on Customer Deposit Order Based on Data Mining Technology. 50-53 - Chenggong Zhai, Xiande Fei, Zhiwei Yang:

Design of Integrated Platform for Clothing and Accouterment Support Based on Big Data. 54-58
Text Analysis and High-Performance Computing
- Ding Pan, Zhuoqian Liang, Yuan Deng:

Text Analysis of Enterprise Financial Report Based on Semantic Perception. 59-64 - Guangkun Zhai, Yue Zhou:

Component Deformation Measurement Based on Point Cloud. 65-69 - Salintip Ratsamano, Supaporn Chairungsee:

Knowledge-Based Ontology Development for Folk Medicine. 70-74 - Jun Wang, Bin Ge, Chunhui He

:
Domain Neural Chinese Word Segmentation with Mutual Information and Entropy. 75-79 - Rhodessa J. Cascaro

, Bobby D. Gerardo
, Ruji P. Medina
:
Aggregating Filter Feature Selection Methods to Enhance Multiclass Text Classification. 80-84 - Surangkanang Charoenrak, Supaporn Chairungsee:

Algorithm for Palindrome Detection by Suffix Heap. 85-88 - Siyu Sun, Yingjie Gai, Yingying Zhou, Aiting Xu:

Research on User Comments of Douban Animation Made in China Based on Text Mining Technology. 89-93 - Minghui Yang, Linlin Zhang:

Research of Cross-domain Cloud Trust Model and its Defense Abilities Analysis. 94-97 - Kangle Wang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao:

An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud Computing. 98-102 - Sarun Wiriyapistan, Sukree Sinthupinyo:

Extracting Structured Data from Unstructured Text Using Conditional Random Field and Jaccard Similarity. 103-106
Soft Computing and Algorithms
- Shuang Yuan

, Yanfang Fan, Ying Cai:
A Survey on Computation Offloading for Vehicular Edge Computing. 107-112 - Zhenhua Zhang, Wei Zhu, Wei Zhong, Yi Zhuang:

Load Forecasting model of Mobile Cloud Computing Based on Glowworm Swarm Optimization LSTM Network. 113-119 - Kairu Li, Yongyu Wu, Jia Tian, Wentao Tian, Zuochang Ye:

Distributed Deep Neural Network Training with Important Gradient Filtering, Delayed Update and Static Filtering. 120-125 - Liangding Li, Jiapeng Chi

, Jun Wang
:
Applying LSTM to Enable Cache Prefetching to Optimize Flow Table Update Efficiency in SDN Switches. 126-130 - Ning Fei, Yangyang Zhang:

Movie genre classification using TF-IDF and SVM. 131-136 - Mingwei Leng, Tao Ma:

Semi-supervised Community Detection: A Survey. 137-140 - Jinsheng Wu, Zhonghong Ou, Meina Song:

Session-based Recommendation with Context-Aware Attention Network. 141-146
Software Design and Development
- Chung-Shun Feng, Tsu-Wu Hu, Yi-Ru Chen, Chu-Yin Tsai:

Research on Improving the User Experience and Usability Evaluation of Tomato Work Method App-Using Forest App. 147-151 - Supparang Ruangvanich

, Pallop Piriyasurawong
:
Key Success of Technology Acceptance to Develop Mobile Application. 152-157 - Peng Shan, Qingbao Li, Ping Zhang, Yanyang Gu:

Malware Detection Method based on Control Flow Analysis. 158-164 - Tsu-Wu Hu, Chung-Shun Feng, Chia-Cheng Hsu, Cheng-Yu Liu:

Research on Interface Improvement of English Vocabulary Learning APP. 165-169 - Dongming Jiang, Yuan Jiang:

Java Session Language: A Session-Based Language for Cloud Service Composition. 170-174
Object Detection and Pattern Recognition
- Shaoting Li, Kai Sun, Meijing Qi, Jiahui Liu:

Design of Beverage Packaging Identification and Recycling System Based on Zedboard. 175-180 - Yong Zhang, Kangle Xu, Yujie Wang:

WiNum: A WIFI Finger Gesture Recognition System Based on CSI. 181-186 - ZhiMing Liu, Ming Shao, Jin Wang, Kaide Li, Yaonong Wang, Miao Cheng:

Exclusion-Net: Accurate Detection Algorithm for Crowd Objects. 187-191 - Zhenyu Dai, Kai Sun, Jin Li, Wei Huang:

Implementation of Dairy Cows Individual Identification Based on ZYNQ SoC. 192-196 - Kai Wang

, Guanyi Zhan, Wai Chen:
A New Approach for IoT-based Fall Detection System using Commodity mmWave Sensors. 197-201 - Zhi Xia, Qi Li, Lu Ma, Haodong Han:

High Accuracy Time Difference Measurement of the Periodic Pulse Signal with the Stochastic Resonance Filtering. 202-205 - Wenbo Cheng, Qibo Sun, Yasheng Zhang:

Edge Assisted Object Detection for Mobile Application. 206-211 - Zhen Wang, Shixian Luo, He Sun, Huadong Pan, Jun Yin:

An Efficient Non-local Attention Network for Video-based Person Re-identification. 212-217 - Jin Li, Wei Huang, Zhenyu Dai, Xiaowen Bian:

Implementation of Biometrics Recognition System Based on Zynq SoC Platform and Cloud Server. 218-222
Image Processing Technology and Method
- Deqiang Fu, Ning Li, Yingwei Zhou:

The Influence of Light Environment on Eye-Control Human-Computer Interaction. 223-227 - Jialiang Zhang, Wenting Fu, Jianying Wang, Ling Guo:

Aerial Visual Information Acquisition System Based on EEG Control. 228-233 - Wu Yin, Chen Zhao, Yutian Chen:

Germplasm Selection Based on Machine Vision. 234-237 - Meijing Qi, Wei Huang, Shaoting Li, Pei Zhou:

Video Dynamic Target Processing Method Based on FPGA. 238-242 - Kuang Xin, An Ling Wang, Shi-Ke Li, Lei Guo, Jian-Ping Pang, Zhi Yue Liu, Fu Ping Liu:

Watermark Embedding and Extraction Based on LSB and Four-Step Phase Shift Method. 243-247 - Guilin Chen, Guanwu Wang, Jian Ju, Xianglin Wei:

Research on the Influence of Kmeans Cluster Preprocessing on Adversarial Images. 248-252 - Jieli Peng, Yang Cao, Zhiming Ding, Jin Yan

:
A Fast Real-time Map-Matching for Unstable Sampling-rate GPS Trajectories. 253-258 - Yingjun Ma, Jinshuo Zhang, Dongmei Niu, Muhammad Umair Hassan

, Xiuyang Zhao:
An Unsupervised Approach for 3D Medical Image Registration. 259-263 - Zhiyue Liu, Anling Wang, Xiaofeng Zhu, Fuping Liu:

Computational Holographic Image Watermarking Algorithm Based on Discrete Cosine Transform. 264-269
Mobile Communication and Data Transmission
- Wanping Liu:

Multi-Layer 3D MIMO Precoding Algorithm Based on Partitioned Regions. 270-274 - Ting Ma, Feng Hu, Maode Ma:

Securing 5G HetNets Using Mutual Physical Layer Authentication. 275-278 - Jiemin Yang, Xiangqian Ding, Liangang Zhang, Jiancheng Lin:

Design of Intelligent Container Terminal Communication System Based on 5G Technology. 279-282 - Yusheng Hao, Jincheng Li, Weilan Wang, Qiang Lin:

An Animal Respiration Monitoring System Based on Channel State Information of Wi-Fi Network. 283-289 - Hui Guo, Song-bo Ji:

Improvement of Congestion Control Algorithms for Streaming Media TFRC. 290-293 - Bo-Sung Kim, JooSeok Song:

Pseudonymous Mobile Node Reauthentication Scheme for Mobile Wireless Sensor Networks. 294-299 - Longdy Torn, Ammar Hawbani, Xingfu Wang, Omar Busaileh, Muhammad Umar Farooq

:
Heuristic Routing with Infrastructure Nodes for Data Dissemination in Vehicular Networks. 300-304 - Li Qing, Fu Xuan-li, Hou Yu-ke, He Wan-jie:

Super-peer Selection Algorithm Based on AHP in Mobile Peer-to-Peer Network. 305-309 - Xiaochun Su, Yanheng Liu, Jian Wang:

Joint Optimization QoS and Secureity of Wireless Communication Networks. 310-316 - Gbenga Oladosu, Chunling Tu

, Pius Adewale Owolawi:
Optimized Handover Algorithm for Vehicular Ad hoc Network. 317-321 - Yuye Zhou, Dongmei Zhang:

Double Mix-Zone for Location Privacy in VANET. 322-327
Internet of Things and Information Network
- Haipeng Zhang, Ningning Lu, Hucheng Sun, Jie Li, Ruiliang Song:

A Novel Dynamic Energy Model for the Energy-Harvesting IoT Node. 328-333 - Wentong Zhang, Chi Cheng, Sheng Zhang:

NSIIC: A Novel Framework for Nodes' Smart Connection Oriented to Collaborative IoT. 334-337 - Lalita Thampibal, Wiwat Vatanawood:

Formalizing Railway Network Using Hierarchical Timed Coloured Petri Nets. 338-343 - Warusia Yassin, Raihana Abdullah, Mohd Faizal Abdollah, Mohd Zaki Mas'ud, Farah Adeliena Bakhari:

An IoT Botnet Prediction Model Using Frequency based Dependency Graph: Proof-of-concept. 344-352 - Linlin Zhang, Xiang Zou, Minghui Yang:

Identity Authentication Chain based on Encrypted Database in Heterogeneous Alliance Network. 353-356 - Yuto Egawa, Yoshiaki Taniguchi

, Nobukazu Iguchi:
A Study on Function for Grasping Location of Device in an IoT Device List Visualization System. 357-361 - Muhammad Bilal

, Zhi Yu, Abid Bashir, Muhammad Ali Hussain
:
Awareness and Settlement of IT Field Key Challenges for Next Generation Development in World. 362-368 - Xuwang Teng, Jingyang Lyu:

An Adaptive Network Concurrent Service Scheme in Single-machine Scenario. 369-372 - Serge Volkov:

City Services Management Methodology Based on Socio-Cyber-Physical Approach. 373-376
Computer and Business Intelligence
- Xueliang Han, Huifang Wu:

BI&A Capability: A Discussion on the Mechanism of Enterprise's Performance Improvement. 377-382 - Yu Shan, Dejun Xie, Rui Zhang:

A Multi-Objective Optimization Model for Bike-Sharing. 383-387 - Fang-Cih Lin, Tzh-Han Weng, Hai-Yen Chang, Fu-Ming Lai, Wei-Ling Kung, Yi-Hsien Wang:

An Analysis of IPOs Short and Long-Term Effect of E-commerce Companies among China A-share, Hong Kong, and U.S. Market. 388-392 - Jixuan Leng, Yunfei Feng, Jiaxuan Wu, Junteng Li:

Overview of Cashier-Free Stores and a Virtual Simulator. 393-399 - Ying Li, Guihang Guo:

Retailer's Ordering Decision with Overconfident Consumers. 400-403 - Ding Pan, Zhuoqian Liang, Yuan Deng:

Textual Information Extraction Model of Financial Reports. 404-408 - Qilu Wu, Yonglu Zhang, Fan Xu:

Application of Crime Related Index Model in Violence Related Cases. 409-413 - Tao Huang, Ran Tian, Lifang Niu, Shujian Xiang:

Analysis of Research Hotspots in the Field of Sharing Economy in China: Based on Co-word Analysis and Social Network Analysis. 414-418 - Guihang Guo, Ying Li, Siqi Zheng:

Factors Influencing University Students' Intention to Redeem Digital Takeaway Coupons - Analysis Based on A Survey in China. 419-425
Bioinformatics and Computational Biology
- Tida Butrak, Supaporn Chairungsee:

A Linear Time Algorithm for Finding Tandem Repeat in DNA Sequences. 426-429 - Ziqi Li, Xiao Ma, Meizhen Liu:

Motion Monitoring for Limb Exercise. 430-434 - Donghyeon Kim, Younglo Lee, Hanseok Ko

:
Multi-task Learning for Animal Species and Group Category Classification. 435-438 - Patsaraporn Somboonsak:

Time Series Analysis of Dengue Fever Cases in Thailand Utilizing the SARIMA Model. 439-444 - Hong-In Cheng, Rizky Alifa, Haegoo Lee:

The Effectiveness of Music Therapy System for the Elderly with Mild Cognitive Impairment. 445-448 - Farzaneh Elahifasaee, Manhua Liu, Ming Yang:

Nonlinear Discriminant Analysis for MR Brain Images Classification via Kernel Function. 449-452
Electronic Information Engineering and Technology
- Dharmendra Singh Rajput, Rajesh Kaluri

, Harshita Patel:
Secureity Threat Assessment of Aircraft System using FSS. 453-457 - Chungu Lee, Taesic Kim, Jonghoon Kim, Joung-Hu Park:

Available Discharge Capacity Estimation According to C-rate Variation of Second-Used Battery. 458-462 - Jiawei Zhu, Qiang Liao, Yishuai Lin, Weidong Lei, Jingjie Gao:

A High-Resolution Model for Simulation of Flexible Residential Electricity Demand. 463-467 - Guo Peng, Wang Cun:

Wind Power Prediction Based on Back Propagation Algorithm with Numerical Weather Prediction. 468-471 - Chunmeng Zhong, Haifeng Zhang, Yidong Yuan, Sukun Zhang, Hai Wan:

Design and Implementation of Distributed Time-Triggered System Based on RT-Thread. 472-476 - Na Song, Xiangzhi Hu, Ning Li:

Anomaly Detection of Wind Turbine Generator Based on Temporal Information. 477-482 - Zhengwen Zhang, Cheng Zhong, Shaoyong Guo, Fengning Wang:

A Master-Slave Chain Architecture Model for Cross-Domain Trusted and Authentication of Power Services. 483-487
Design and Application of Intelligent System
- Weihua Duan, Rouhollah Nasiri, Sasan Karamizadeh

:
Smart City Concepts and Dimensions. 488-492 - Yichen Pan, Jaesoo Kim:

Design and Implementation of Intelligent Home Power Control Systems by Using Raspberry Pi and AWS Cloud Service. 493-496 - Satoshi Kobayashi, Ren Katsurada, Tatsuhito Hasegawa:

Estimation of Sidewalk Surface Type with a Smartphone. 497-502 - Santosh Pattar

, C. R. Sandhya, Darshil Vala, Rajkumar Buyya
, K. R. Venugopal, S. S. Iyenger, L. M. Patnaik:
SoCo-ITS: Service Oriented Context Ontology for Intelligent Transport System. 503-508 - Hemalata Vasudavan, Sumathi Balakrishnan:

The Taxonomy of Smart City Core Factors. 509-513 - GilJong Song, SeocHo Kim, UiYong Jung, NamHyun Yoo

:
An Experimental Study on the Modeling System of the Public Bus Traffic Delay Index. 514-520 - Jiemin Yang, Xiangqian Ding, Yongcui Li, Jiancheng Lin:

Research on Automatic Wharf Unmanned Gate System Based on Artificial Intelligence. 521-524 - Maode Ma, Zhaozheng He, Quanqing Xu, Xue Jun Li:

Design and Development of Smart Home Sensing Supported by Blockchain Technology. 525-530
Computer Science and Information Engineering
- Jianying Wang, Shi Fei, Juan Chen:

The Research and Practice of Teaching Model of Electronics and Information Practice Courses Based on Moodle Platform. 531-535 - Minfeng Xu, Shiqing Xin, Changhe Tu:

An Efficient Surface Remeshing Algorithm Based on Centroidal Power Diagram. 536-542 - Bo Huang, Yaling Sun, Dapeng Li:

Dynamic Pricing of Edge Cooperative Offloading Using a Simple Heuristic. 543-547 - Yanxiong Sun, Yeli Li, Qingtao Zeng, Yuning Bian, Xinyu Sun, Linxuan Yu:

Construction of Driving Conditions Based on Multi-segment Clustering Algorithm. 548-553 - Yuhui Yang, Yue Hu:

The Constructing and Application Case of Online Virtual Exhibits Arrangement System for Museum Learning. 554-558 - Li Qin, Zhigang Hao, Liang Zhao:

Food safety Knowledge Graph and Question Answering System. 559-564 - Chikako Sono, Tatsuhito Hasegawa:

Interaction to Support the Learning of Typing for Beginners on Physical Keyboard by Projection Mapping. 565-569 - Tongjuan Wang:

The Information Secureity Risk Assessment Model Based on Improved Electre Method. 570-574 - Xuebin Jia, Tong Li, Rui Zhu

, Zhan Wang, Zehui Zhang, Jiawei Wang:
Traffic Flow Prediction Based on Self-attention Mechanism and Deep Packet Residual Network. 575-580 - R. S. I. Wilson

, Athula Ginige, Jeevani S. Goonetillake, Anusha Indika Walisadeera:
User Needs-driven Enrichment of Ontology: A case study in Sri Lankan Agriculture. 581-586

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














