default search action
22nd CSE / 17th EUC 2019: New York, NY, USA
- Meikang Qiu:
2019 IEEE International Conference on Computational Science and Engineering, CSE 2019, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2019, New York, NY, USA, August 1-3, 2019. IEEE 2019, ISBN 978-1-7281-1664-8
The 22nd IEEE International Conference on ComputationalScience and Engineering (IEEE CSE 2019)
CSE 1
- Ashutosh Kanitkar, Rutwik Kulkarni, Varun Joshi, Yash Karwa, Sanjyot Gindi, Geetanjali Vinayak Kale:
Automatic Detection of Cervical Region from VIA and VILI Images using Machine Learning. 1-6 - Saud Alashri, Sultan Alzahrani, Muneera Alhoshan, Imaan Alkhanen, Sara Alghunaim, Manal Alhassoun:
Lexi-Augmenter: Lexicon-Based Model for Tweets Sentiment Analysis. 7-10 - Bhagya Nathali Silva, Murad Khan, Kyuchang Lee, Yongtak Yoon, Diyan Muhammad, Jihun Han, Kijun Han:
Ubiquitous RESTful Smart Home Energy Management System. 11-15 - Jing Yu, Yao Fu, Yanan Zheng, Zheng Wang, Xiaojun Ye:
Test4Deep: an Effective White-Box Testing for Deep Neural Networks. 16-23
CSE 2
- Jatin Gupta, Rituparna Datta, Arun Kumar Sharma, Aviv Segev, Bishakh Bhattacharya:
Evolutionary Computation for Optimal LQR Weighting Matrices for Lower Limb Exoskeleton Feedback Control. 24-29 - Kseniia Sinitsyna, Anton Petrochenkov, Bernd Krause:
Identification of Electric Power Consumption Patterns in Relation to Standard Load Profiles. 30-35 - Andleeb Aslam, Usman Qamar, Reda Ayesha Khan, Pakizah Saqib, Aleena Ahmad, Aiman Qadeer:
Opinion Mining Using Live Twitter Data. 36-39 - Xin Zhang, Francisco Reveriano, Jiang Lu, Xingang Fu, Ting Zhang:
The Effect of High Performance Computer on Deep Learning: A Face Expression Recognition Case. 40-42
CSE 3
- Mohammed S. Alzaidi, Walid K. M. Ahmed, Victor B. Lawrence:
ISI Mitigation Using Three Taps FIR Zero-Forcing Technique for Diffusion-Based Molecular Communications. 43-47 - Solomon Teshome Girma, Dominic B. O. Konditi, Ciira Wa Maina:
Efficient Co-Channel Interference Suppression by Hybrid of a Binomial Array and Uniform Linear Array. 48-56 - Osama Zwaid Alsulami, Mohammed T. Alresheedi, Jaafar M. H. Elmirghani:
Infrared Uplink Design for Visible Light Communication (VLC) Systems with Beam Steering. 57-60 - Liangming Cai, Rituparna Datta, Yurong Li, Jingshan Huang, Chunqiang Chen, Xiaoling Wang, Shurui Lin, Kai Cheng, Jiefeng Huang, Jinping Jiang, Minchen Zhu, Min Du:
An Open Source Map Optimization Platform for Efficient Navigation. 61-65
CSE 4
- Xiao Zeng, Hong Guo, Wei Hu:
Design and Implementation of Shipping Video Surveillance Equipment Based on Raspberry Pi. 66-70 - Daiana Tomescu, Adelaida Heiman, Alina Badescu:
An Automatic Remote Monitoring System for Large Networks. 71-73 - Igor Lashkov, Alexey M. Kashevnik, Nikolay Shilov, Vladimir Parfenov, Anton I. Shabaev:
Driver Dangerous State Detection Based on OpenCV & Dlib Libraries Using Mobile Video Processing. 74-79 - Toshiro Nunome, Ryota Miyazaki:
The Effect of Contents and Available Viewpoints on QoE of Multi-view Video and Audio over WebRTC. 80-85
CSE 5
- Yi Zeng, Meikang Qiu, Jingqi Niu, Yanxin Long, Jian Xiong, Meiqin Liu:
V-PSC: A Perturbation-Based Causative Attack Against DL Classifiers' Supply Chain in VANET. 86-91 - Ryan McDowell, Ryan N. Rakvic, Hau T. Ngo, T. Owens Walker, Robert W. Ives, Dane Brown:
Using Current Draw Analysis to Identify Suspicious Firmware Behavior in Solid State Drives. 92-97 - Tai-Yin Chong, Vaibhav K. Anu, Kazi Zakia Sultana:
Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source Projects. 98-103
CSE 6
- Rahul Kumar Chaurasiya, Shourya Shukla, Tirath Prasad Sahu:
A Sequential Study of Emotions through EEG using HMM. 104-109 - Omneya Attallah:
Multi-tasks Biometric System for Personal Identification. 110-114 - Sukun Li, Sonal Savaliya, Leonard Marino, Avery Leider, Charles C. Tappert:
Brain Signal Authentication for Human-Computer Interaction in Virtual Reality. 115-120 - Meng Chen, Ye-Feng Li, Shu-Di Bao, Ye-Jiao Zhang:
A Comparative Performance Study of Electrocardiogram-Based Human Identity Recognition. 121-126
CSE 7
- Yanqi Li, Jianzhou Liu, Shaoming Zhi:
Fully CNN-Based Pixel Level Classification Model for Urban Land Image Acquired by Unmanned Aerial Vehicle. 127-132 - Okeke Stephen, Young Jick Jang, Tae Soo Yun, Mangal Sain:
Depth-Wise Based Convolutional Neural Network for Street Imagery Digit Number Classification. 133-137 - Subin Lee, Jun-Geol Baek:
Generative Pseudorehearsal Strategy for Fault Classification Under an Incremental Learning. 138-140
CSE 8
- Alex Erdogan, Kiran George:
Deinterleaving Radar Pulse Train Using Neural Networks. 141-147 - Da Hyeon Choi:
LYRA: an Interactive and Interactive Storyteller. 148-153 - Gregory Falco:
Participatory AI: Reducing AI Bias and Developing Socially Responsible AI in Smart Cities. 154-158 - M. D. Samrajesh, K. K. Viswanathan:
Reliable Component Instance for Multi-tenant Software as a Service Application. 159-164
CSE 9
- Md. Ahsan Ayub, Steven Smith, Ambareen Siraj:
A Protocol Independent Approach in Network Covert Channel Detection. 165-170 - Mangal Sain, Ki-Hwan Kim, Young-Jin Kang, Hoon-Jae Lee:
An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing. 171-175 - Kazi Zakia Sultana, Tai-Yin Chong:
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics. 176-181 - Mona Alkanhal, Bharath K. Samanthula:
A Privacy-Aware Framework for Friend Recommendations in Online Social Networks. 182-187
CSE 10
- Lizong Zhang, Xiang Shen, Fengming Zhang, Minghui Ren, Binbin Ge, Bo Li:
Anomaly Detection for Power Grid Based on Time Series Model. 188-192 - Diab M. Diab, Basil AsSadhan, Hamad Binsalleeh, Sangarapillai Lambotharan, Konstantinos G. Kyriakopoulos, Ibrahim Ghafir:
Anomaly Detection Using Dynamic Time Warping. 193-198 - Yurui Wang, Zhihui Du, Jun Jiang, Baokun Lu, Chongyu Wang:
Modeling the Parallel Efficiency of Density Functional Theory Based Jobs on Sunway TaihuLight. 199-204 - Tanhong Chen, Huiyong Li, Jianwei Niu, Tao Ren, Guizhou Xu:
Embedded Partitioning Real-Time Operating System Based on Microkernel. 205-210
CSE 11
- Junqiu Liu, Fei Wang, Shuang Zhao, Xin Wang, Shuhui Chen:
iMonitor, An APP-Level Traffic Monitoring and Labeling System for iOS Devices. 211-218 - Donghoon Kim, Luke Sample:
Search Prevention with Captcha Against Web Indexing: A Proof of Concept. 219-224 - xiaodi Fu, Jiang Lu, Xin Zhang, Xiaokun Yang, Ishaq Unwala:
Intelligent In-Vehicle Safety and Security Monitoring System with Face Recognition. 225-229
CSE 12
- Kyuchang Chang, Jun-Geol Baek:
Univiariate Signal Preprocessing Methodology for Fault Detection in Semiconductor Manufacturing Process. 230-232 - Hiroyuki Kagami:
Estimation of the Spouting Time by the Mathematical Model That Describes the Periodic Spouting of a Geyser Induced by Boiling. 233-236 - SungEn Kim, KeeHong Ahn, SuKyoung Kim:
A Method of Educational Quality Administration Based on Hyper Meta Ontology. 237-242 - Reda Ayesha Khan, Usman Qamar, Andleeb Aslam, Pakizah Saqib, Aleena Ahmad:
Quality Framework for Ontologies Evaluation Based on Structural Characteristics. 243-248
CSE 13
- Parvizsho Aminov, Navjot Bola, Dipti Shiralkar, Meghana Yoganarasimha:
Cloud Based Algorithm for Task Management. 249-253 - Seba Susan, Aparna Bhutani:
A Novel Memetic Algorithm Incorporating Greedy Stochastic Local Search Mutation for Course Scheduling. 254-259 - Nasim Nezamoddini, Amirhosein Gholami:
Integrated Genetic Algorithm and Artificial Neural Network. 260-262 - Jae Yeol Hong, Seung Hwan Park, Jun-Geol Baek:
Segmented Dynamic Time Warping Based Signal Pattern Classification. 263-265
CSE 14
- Kyunam Cho, Hyunseok Lee, Kideuk Bang, Sungsoo Kim:
Possibility of HPC Application on Cloud Infrastructure by Container Cluster. 266-271 - Andrew Addison, Ari Krish, Ryan Prins, Larry Ryan, Nicole Villette, Charles Andrews, Newas Azad, Daniel Bardsley, John Bauman, Jeffrey Diaz, Tatiana Didik, Komoliddin Fazliddin, Maria Gromoa:
Low-Latency Trading in the Cloud Environment. 272-282 - Jack Slater, Alan Nesbitt, Gordon Morison, Philip Boreham:
A Hybrid Cloud for Data Analytics in Electrical Substation Condition Monitoring Systems. 283-288 - Khushbu Khalid Butt, Guo Hui Li, Muhammad Obaid Ur Rehman:
Comparative Analysis of Hadoop Security Ad-Ons. 289-293 - Jianfeng Zou, Xueqi Jin, Lei Zhang, Yueqiang Wang, Bo Li:
A Case Study of Anomaly Detection in Industrial Environments. 294-298
CSE 15
- Honglei Zheng, Hong Guo:
Design and Implementation of Campus Service System Platform Based on Big Data. 299-302 - Yongze Sun, Zhonghua Lu:
Financial Quantitative Big Data Platform Based on High Performance Computing. 303-307 - Takashi Yoshikawa, Susumu Date, Yasuhiro Watashiba, Yuki Matsui, Kazunori Nozaki, Shinya Murakami, Chonho Lee, Masami Hida, Shinji Shimojo:
Secure Staging System for Highly Confidential Data Built on Reconfigurable Computing Platform. 308-313 - Monerah Al-Mekhlal, Amir A. Khwaja:
A Synthesis of Big Data Definition and Characteristics. 314-322 - Art Sedighi, Doug Jacobson:
Forensic Analysis of Cloud Virtual Environments. 323-329
CSE 16
- Myeonggil Choi:
The Security Risks of Cloud Computing. 330 - Anitha Ilapakurti, Sharat Kedari, Rajasekar Vuppalapati, Santosh Kedari, Jaya Shankar Vuppalapati, Chandrasekar Vuppalapati:
Human-AI Symbiosis: Decode Climate Change to Prevent Heat-Related Mortalities and to Protect Our Most Vulnerable Population. 331-338 - Chandrasekar Vuppalapati, Sharat Kedari, Anitha Ilapakurti, Santosh Kedari, Jaya Shankar Vuppalapati:
Emotional Health: A Data Driven Approach to Understand our Emotions and Improve our Health. 339-347 - Hisayoshi Sugiyama:
(Poster) Parallel and Distributed Operation of Smart Grid with Pulsed Power Transmission. 348 - Nusrat Jahan, Rakib Ul Haque, Aloke Kumar Saha, Muhammad Firoz Mridha, Md. Abdul Hamid:
Identification of Expectancy, Proximity, and Compatibility of the Bengali Language. 349-354
The 17th IEEE International Conference on Embedded andUbiquitous Computing (IEEE EUC 2019)
EUC 1
- Jihe Wang, Huang Shu, Jiaxiang Zhao, Danghui Wang:
UltraGroup: Towards Deploying MobileNet to Ultra-Resource-Bounded Edge Devices. 355-360 - Bassma Aldahlan, Zongming Fei:
A Geographic Routing Strategy with DTN Support for Vehicular Named Data Networking. 361-366 - Rodrigo da Rosa Righi, Alexandre Lima Santana, Cristiano André da Costa, Rafael Kunst, Guilherme Goldschmidt, Dhananjay Singh, Madhusudan Singh:
Reducing Cost and Time-to-Market on Supporting Driver Assistance Systems to Avoid Rear-end Collisions in Vehicles Traffic. 367-372 - Ming Wu, Qianmu Li, Shuo Wang, Jun Hou:
A Subjectivity-Aware Algorithm for Label Aggregation in Crowdsourcing. 373-378
EUC 2
- Ahmed Raza Malik, Laurel Pilon, Jennifer Boger:
Development of a Smart Seat Cushion for Heart Rate Monitoring Using Ballistocardiography. 379-383 - Ruth Sandra Harry, Raymond Joseph:
Enhancements in Anomaly Detection in Body Sensor Networks. 384-389 - Byounghyun Yoo, Shapna Muralidharan, Chanwoong Lee, Jia Lee, Heedong Ko:
KLog-Home: A Holistic Approach of In-Situ Monitoring in Elderly-Care Home. 390-396 - Maryam Al Thawadi, Farag M. Sallabi, Mamoun Awad, Khaled Shuaib:
Disruptive IoT-Based Healthcare Insurance Business Model. 397-403
EUC 3
- Junhui Cai, Qianmu Li, Yini Chen, Yaozong Liu, Yi Xia, Sajjad Rahmany:
Troubleshooting Test Method Based on Industrial Control Grammar Model. 404-409 - Gabriel Habib Medeiros Oliveira, Renan Fonteles Albuquerque, Adriano Bessa Albuquerque:
A Comprehensive Study on Knowledge Management Applied to Embedded System Testing Processes. 410-418 - Song Xia, Hao Jiang, Yi Zhang, Duo Peng:
Internet Advertising Investment Analysis Based on Beijing and Jinhua Signaling Data. 419-426 - Chi-Yi Lin, Guan-Ying Jhu, Siang Siao:
An Innovative Queue Management System Based on Bluetooth Beacon Technology. 427-430
EUC 4
- Tian Qiu, Qianmu Li, Jun Hou, Shunmei Meng, Huaqiu Long, Yaozong Liu:
Fusion Learning Model for Embedded Face Safe Detection and Facial Gesture Analysis. 431-435 - Rei Ito, Mineto Tsukada, Masaaki Kondo, Hiroki Matsutani:
An Adaptive Abnormal Behavior Detection using Online Sequential Learning. 436-440 - Haibo Liu, Qianmu Li, Shunmei Meng, Zhenbang Rong:
Safe Facial Multi-Attribute Feature Fusion Analysis Based on Embedded Multi-Task Learning. 441-446 - Yanxia Zhang, Andreas Girgensohn, Yulius Tjahjadi:
Activity Forecasting in Routine Tasks by Combining Local Motion Trajectories and High-Level Temporal Models. 447-452
EUC 5
- Zheng Li:
Scheduling of Two-Phase Mixed-Criticality Systems on Memory Shared Multi-Core Platforms. 453-458 - Xiaohui Wei, Ruyu Zhang, Yuanyuan Liu, Hengshan Yue, Jingweijia Tan:
Evaluating the Soft Error Resilience of Instructions for GPU Applications. 459-464
EUC 6
- Masaya Yoshikawa, Yusuke Nozaki:
Side-Channel Analysis for Searchable Encryption System and its Security Evaluation. 465-469 - Chaoxian Lv, Qianmu Li, Huaqiu Long, Yumei Ren, Fei Ling:
A Differential Privacy Random Forest Method of Privacy Protection in Cloud. 470-475 - Gianpiero Costantino, Ilaria Matteucci:
CANDY CREAM - Hacking Infotainment Android Systems to Command Instrument Cluster via Can Data Frame. 476-481 - Oluwaseyi Ajayi, Melvin Cherian, Tarek N. Saadawi:
Secured Cyber-Attack Signatures Distribution using Blockchain Technology. 482-488 - Xiao Chen:
A Stable Task Assignment Scheme in Crowdsourcing. 489-494
EUC 7
- Min-Kyu Kim, Dong-Jun Park, Jun-Woo Lee, Se-Jin Ahn, Myung-Jun Shin:
Quantitative Evaluation of TUG Test with IMU and sEMG Sensors in Wearable Device (Poster). 495 - Dong-Hyun Lee, Dong-Jun Park, Myung-Jun Lee, Se-Jin Ahn, Weui-Bong Jeong:
Quantification of Hand Motor Disturbance in Parkinson's Patients using sEMG Sensor (Poster). 496 - Dong-Jun Park, Jun-Woo Lee, Myung-Jun Lee, Se-Jin Ahn, Weui-Bong Jeong:
Wearable IMU Sensor for Monitoring Hand Motion Disorder in Parkinson's Patients (Poster). 497 - Zhijun Zhao, Zhengwei Jiang, Yueqiang Wang, Guoen Chen, Bo Li:
Experimental Verification of Security Measures in Industrial Environments. 498-502
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.