Strengthen nodal cooperation for data dissemination in mobile social networks
Data dissemination is a challenging issue in mobile social networks. It aims at increasing the overall delivery ratio and reducing the overall delivery delay. Most of the existing works assume all the users in a network are cooperative, i.e., the users ...
Self-Universum support vector machine
In this paper, for an improved twin support vector machine (TWSVM), we give it a theoretical explanation based on the concept of Universum and then name it Self-Universum support vector machine (SUSVM). For the binary classification problem, SUSVM takes ...
An extensible and active semantic model of information organizing for the Internet of Things
Data management and information processing play the key roles in developing the Internet of Things (IoT). The requirements of a well-defined data model for IoT involve in six aspects: semantic supporting, active data extracting and explaining, ...
mDHT: a multi-level-indexed DHT algorithm to extra-large-scale data retrieval on HDFS/Hadoop architecture
Corresponding to the storing and fast searching needs of an extra-large scale of energy monitoring and statistics data, we propose a multi-level-indexed distributed hash table (mDHT) algorithm and complete a MapReduce implementation of the algorithm on ...
A synergetic mechanism for digital library service in mobile and cloud computing environment
Digital library services in the mobile computing have come into our daily life with the development of wireless communication and the manufacture of mobile devices. Digital libraries have collected large-scaled data for providing information service. ...
On improving aggregate recommendation diversity and novelty in folksonomy-based social systems
Benefit from technical advances in the Internet of Things, many social media applications relative to folksonomy have become ubiquitous. The size and complexity of folksonomy-based systems can unfortunately lead to information overload and reduced ...
Toward inference attacks for k-anonymity
Current research still cannot effectively prevent an inference attacker from inferring privacy information for k-anonymous data sets. To solve the issue, we must first study all kinds of aggressive reasoning behaviors and process for the attacker ...
Session-based security enhancement of RFID systems for emerging open-loop applications
Radio frequency identification (RFID) is an important technique used for automatic identification and data capture. In recent years, low-cost RFID tags have been used in many open-loop applications beyond supply chain management, such as the tagging of ...
Secured access control for vehicles in RFID systems on roads
Vehicle access control systems exist everywhere in our daily life. However, the simple permit-based verification method is not sufficient for the critical departments such as banks and courts, which need to check not only the identity of the vehicles, ...
WTrack: HMM-based walk pattern recognition and indoor pedestrian tracking using phone inertial sensors
Indoor tracking systems have become very popular, wherein pedestrian movement is analyzed in a variety of commercial and secure spaces. The inertial sensor-based method makes great contributions to continuous and seamless indoor pedestrian tracking. ...
When smart grid meets PHEVs: a smart load distribution mechanism in smart grid
Along with the increasing popularity of electric vehicles caused by economic and environmental incentives, the penetration of plug-in hybrid electric vehicles (PHEVs) poses a great threat to the power grid, especially to the aggregated load in the power ...
Performance monitoring and evaluation in dance teaching with mobile sensing technology
One of the most important jobs of dance teacher is to detect and estimate the performances of the students during their practices, including confirming the completion of the moves in and out of class as well as evaluating the performance . However, it ...
Directional communication with movement prediction in mobile wireless sensor networks
By introducing mobility to some or all the nodes in a wireless sensor network (WSN), WSN can enhance its capability and flexibility to support multiple missions. In mobile wireless sensor networks, mobile nodes collect data and send data to a sink ...
Research on the comprehensive traffic state evaluation model linked with drivers' perception under the vehicle networking
Unified judgment standards and methods are often adopted to identify traffic state in certain road network based on traffic flow parameters. However, drivers often have different perceptions about the traffic state on different road sections, since ...
A utility maximization approach for information-communication tradeoff in Wireless Body Area Networks
Healthcare systems have made a dramatic shift towards ubiquitous monitoring in the recent past. The reasons for such a change have been ease of timely diagnosis, convenience and comfort of clinical treatments. Wireless Body Area Networks (WBANs) are ...
Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks
Structural health monitoring has received remarkable attention due to the arising structural safety problems. Most of these structural health problems are accumulative damages such as slight changes in structural deformations which are very hard to be ...
Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution
Wireless sensor networks (WSN) is a key enabling technique for achieving the vision of the Internet of Things. In many applications of WSN such as environmental monitoring and vehicle tracking, they may require to launch spatial queries for collecting ...
Managing obesity through mobile phone applications: a state-of-the-art review from a user-centred design perspective
Evidence has shown that the trend of increasing obesity rates has continued in the last decade. Mobile phone applications, benefiting from their ubiquity, have been increasingly used to address this issue. In order to increase the applications' ...
Providing real-time assistance in disaster relief by leveraging crowdsourcing power
- Dingqi Yang,
- Daqing Zhang,
- Korbinian Frank,
- Patrick Robertson,
- Edel Jennings,
- Mark Roddy,
- Michael Lichtenstern
Crowdsourcing platforms for disaster management have drawn a lot of attention in recent years due to their efficiency in disaster relief tasks, especially for disaster data collection and analysis. Although the on-site rescue staff can largely benefit ...
User interaction with everyday lighting systems
New lighting technologies create new opportunities that may contribute to people's experience of light. These opportunities are a result of the increased variety and freedom in terms of colour, form factor and connectivity of the lights. To allow people ...
A robust device for large-scale monitoring of bar soap usage in free-living conditions
This work reports the development and evaluation of a robust and easily deployable soap use logging device. The waterproof device contains motion and sound sensors and can be fully embedded in commercial bar soap. At rest, the device is in a low-power ...