This paper introduced an indoor navigation application that helps junior students in Faculty of Computer science and Information Technology (FSKTM) to find their classroom location. This project implements the A* (pro...
详细信息
The requirement and expanding needs of bridging the physical and cyber world promote the emergence of a new global internet-based information architecture, the Internet of Things. The main challenge in Internet of Thi...
详细信息
ISBN:
(纸本)9781509062966
The requirement and expanding needs of bridging the physical and cyber world promote the emergence of a new global internet-based information architecture, the Internet of Things. The main challenge in Internet of Things is how to make fast and accurate decisions based on multi-modal sensing data. In this paper, we put human into the process and formulate a closed-loop computing paradigm for IoT data and decision intelligence. We first propose a human-in-the-loop reference model, which extends the traditional cyber-physical interaction extended into a closed-loop process based on cyber, physical and human three factors. We defined the three-factor decision paradigm in the model. On the basis of the reference model, we analyze the feature requirement in the data intelligent process and summarize it as three key aspects: semantic, interactive and iterative. Further, we analyze several major challenges facing IoT data and decision intelligence from the perspective of data characteristics. We select and review the recent progress in three typical application domains and analyzed whether the current research has solved the target issues. According to the results of the review and analysis, the paper finally summarizes and addresses some key research directions in the future.
Big data technology is used to integrate, clean up and analyze the data of student management system, educational administration system, and campus card consumption system and so on in this paper. The characteristics ...
详细信息
ISBN:
(纸本)9781509044993
Big data technology is used to integrate, clean up and analyze the data of student management system, educational administration system, and campus card consumption system and so on in this paper. The characteristics of high risk students are extracted and selected, and the prediction model is constructed, which can be used to predict the high risk students scientifically, reasonably and effectively, we can take care of these students and take effective measures to help them improve. The massive data accumulated in Colleges and universities can be effectively utilized by this study, managers have a more detailed understanding of colleges and universities and students, the teaching effect is improved, the risk of student drop-out is reduced. Therefore, this study has strong theoretical value and important practical value.
Predicting the gap between taxi demand and supply in taxi booking apps is completely new and important but challenging. However, manually mining gap rule for different conditions may become impractical because of mass...
详细信息
ISBN:
(纸本)9781509062966
Predicting the gap between taxi demand and supply in taxi booking apps is completely new and important but challenging. However, manually mining gap rule for different conditions may become impractical because of massive and sparse taxi data. Existing works unilaterally consider demand or supply, used only few simple features and verified by little data, but not predict the gap value. Meanwhile, none of them dealing with missing values. In this paper, we introduce a Double Ensemble Gradient Boosting Decision Tree Model (DEGBDT) to predict taxi gap. (1) Our approach specifically considers demand and supply to predict the gap between them. (2) Also, our method provides a greedy feature ranking and selecting method to exploit most reliable features. (3) To deal with missing value, our model takes the lead in proposing a double ensemble method, which secondarily integrates different Gradient Boosting Decision Tree (GBDT) model at the different data sparse situation. Experiments on real large-scale dataset demonstrate that our approach can effectively predict the taxi gap than state-of-the-art methods, and shows that double ensemble method is efficacious for sparse data.
In order to solve the problem of ineffective supervision of MOOC online education and the lack of student enthusiasm,this paper proposed a MOOC-based SPOC College mixed learning mode,which can not only promote interna...
详细信息
In order to solve the problem of ineffective supervision of MOOC online education and the lack of student enthusiasm,this paper proposed a MOOC-based SPOC College mixed learning mode,which can not only promote internal teaching reform of college but also improve the external influence of college.
Recently, functional network connectivity (FNC) is widely applied to detect the functional organization of brain network in the field of psychiatric illnesses analysis. Conventional FNC analyses assume that temporal s...
详细信息
Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. As a solution, we...
详细信息
ISBN:
(纸本)9783319512815;9783319512792
Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. The proposed system calls classification is evaluated and tested using applications from Google Play Store. This research focuses on Android operating system. The experiment was conducted using Drebin dataset which contains 5560 malware applications. Dynamic analysis was used to extract the system calls from each application in a controlled lab environment. This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. The classification has been evaluated in 500 applications and 126 applications have been identified to contain malware.
The proceedings contain 11 papers. The special focus in this conference is on Algorithmic Aspects of Cloud computing. The topics include: Efficient indexing on top of NoSQL databases;an apache spark implementation for...
ISBN:
(纸本)9783319570440
The proceedings contain 11 papers. The special focus in this conference is on Algorithmic Aspects of Cloud computing. The topics include: Efficient indexing on top of NoSQL databases;an apache spark implementation for sentiment analysis on twitter data;a cloud-based time-dependent routing service;a big data architecture for traffic forecasting using multi-source information;mining uncertain graphs;recovering from cloud application deployment failures through re-execution;fair, fast and frugal large scale matchmaking for VM placement;survey of machine learning algorithms on spark over DHT-based structures;scaling out to become doctrinal;a survey on big data and collective intelligence.
This paper mainly introduces the implementation of bank network design and system construction. In the era of rapid network development, the network is becoming more and more important in daily life, especially in som...
详细信息
This paper mainly introduces the implementation of bank network design and system construction. In the era of rapid network development, the network is becoming more and more important in daily life, especially in some large facilities and institutions, the network has become a necessary means to maintain its development. Because the bank is a large financial institution, its design needs are relatively high, not only to be safe, efficient, convenient, but also to consider fault tolerance anddata integrity. In terms of bank demand, the performance planning and implementation of various aspects of the banking network are described point by point. This paper also introduces the overall structure of the bank design, implementation plan and test results.
This paper mainly introduces the wireless mobile Ad Hoc network used for vehicle-to-vehicle communication. It also introduces the concepts of Ad Hoc network, vehicle-mounted Ad Hoc network and typical routing protocol...
详细信息
This paper mainly introduces the wireless mobile Ad Hoc network used for vehicle-to-vehicle communication. It also introduces the concepts of Ad Hoc network, vehicle-mounted Ad Hoc network and typical routing protocols. In this paper, 11 mobile nodes in the vehicle-based Ad Hoc network are studied, and the typical AODV and DSDV routing protocols are simulated in the LINUX environment using the famous simulation software NS2. Through the analysis of the simulation result data, the performance indexes of the two routing protocols are analyzed using performance indicators such as route throughput, jitter, packet loss rate, and end-to-end delay. The final result is that AODV performance is better than DSDV.
暂无评论