


default search action
22nd CSE / 17th EUC 2019: New York, NY, USA
- Meikang Qiu:

2019 IEEE International Conference on Computational Science and Engineering, CSE 2019, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2019, New York, NY, USA, August 1-3, 2019. IEEE 2019, ISBN 978-1-7281-1664-8
The 22nd IEEE International Conference on ComputationalScience and Engineering (IEEE CSE 2019)
CSE 1
- Ashutosh Kanitkar, Rutwik Kulkarni, Varun Joshi, Yash Karwa, Sanjyot Gindi, Geetanjali Vinayak Kale:

Automatic Detection of Cervical Region from VIA and VILI Images using Machine Learning. 1-6 - Saud Alashri, Sultan Alzahrani, Muneera Alhoshan, Imaan Alkhanen, Sara Alghunaim, Manal Alhassoun:

Lexi-Augmenter: Lexicon-Based Model for Tweets Sentiment Analysis. 7-10 - Bhagya Nathali Silva

, Murad Khan, Kyuchang Lee, Yongtak Yoon, Diyan Muhammad, Jihun Han, Kijun Han:
Ubiquitous RESTful Smart Home Energy Management System. 11-15 - Jing Yu, Yao Fu, Yanan Zheng, Zheng Wang, Xiaojun Ye:

Test4Deep: an Effective White-Box Testing for Deep Neural Networks. 16-23
CSE 2
- Jatin Gupta, Rituparna Datta, Arun Kumar Sharma

, Aviv Segev, Bishakh Bhattacharya
:
Evolutionary Computation for Optimal LQR Weighting Matrices for Lower Limb Exoskeleton Feedback Control. 24-29 - Kseniia Sinitsyna, Anton Petrochenkov

, Bernd Krause:
Identification of Electric Power Consumption Patterns in Relation to Standard Load Profiles. 30-35 - Andleeb Aslam, Usman Qamar

, Reda Ayesha Khan, Pakizah Saqib, Aleena Ahmad, Aiman Qadeer:
Opinion Mining Using Live Twitter Data. 36-39 - Xin Zhang, Francisco Reveriano, Jiang Lu, Xingang Fu, Ting Zhang:

The Effect of High Performance Computer on Deep Learning: A Face Expression Recognition Case. 40-42
CSE 3
- Mohammed S. Alzaidi

, Walid K. M. Ahmed, Victor B. Lawrence:
ISI Mitigation Using Three Taps FIR Zero-Forcing Technique for Diffusion-Based Molecular Communications. 43-47 - Solomon Teshome Girma

, Dominic B. O. Konditi, Ciira Wa Maina
:
Efficient Co-Channel Interference Suppression by Hybrid of a Binomial Array and Uniform Linear Array. 48-56 - Osama Zwaid Alsulami, Mohammed T. Alresheedi, Jaafar M. H. Elmirghani

:
Infrared Uplink Design for Visible Light Communication (VLC) Systems with Beam Steering. 57-60 - Liangming Cai, Rituparna Datta, Yurong Li, Jingshan Huang, Chunqiang Chen, Xiaoling Wang, Shurui Lin, Kai Cheng, Jiefeng Huang, Jinping Jiang, Minchen Zhu, Min Du:

An Open Source Map Optimization Platform for Efficient Navigation. 61-65
CSE 4
- Xiao Zeng, Hong Guo, Wei Hu:

Design and Implementation of Shipping Video Surveillance Equipment Based on Raspberry Pi. 66-70 - Daiana Tomescu, Adelaida Heiman

, Alina Badescu
:
An Automatic Remote Monitoring System for Large Networks. 71-73 - Igor Lashkov, Alexey M. Kashevnik, Nikolay Shilov, Vladimir Parfenov, Anton I. Shabaev

:
Driver Dangerous State Detection Based on OpenCV & Dlib Libraries Using Mobile Video Processing. 74-79 - Toshiro Nunome, Ryota Miyazaki:

The Effect of Contents and Available Viewpoints on QoE of Multi-view Video and Audio over WebRTC. 80-85
CSE 5
- Yi Zeng, Meikang Qiu, Jingqi Niu, Yanxin Long, Jian Xiong, Meiqin Liu:

V-PSC: A Perturbation-Based Causative Attack Against DL Classifiers' Supply Chain in VANET. 86-91 - Ryan McDowell

, Ryan N. Rakvic, Hau T. Ngo, T. Owens Walker, Robert W. Ives, Dane Brown:
Using Current Draw Analysis to Identify Suspicious Firmware Behavior in Solid State Drives. 92-97 - Tai-Yin Chong, Vaibhav K. Anu

, Kazi Zakia Sultana:
Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source Projects. 98-103
CSE 6
- Rahul Kumar Chaurasiya

, Shourya Shukla, Tirath Prasad Sahu
:
A Sequential Study of Emotions through EEG using HMM. 104-109 - Omneya Attallah

:
Multi-tasks Biometric System for Personal Identification. 110-114 - Sukun Li, Sonal Savaliya, Leonard Marino, Avery Leider, Charles C. Tappert:

Brain Signal Authentication for Human-Computer Interaction in Virtual Reality. 115-120 - Meng Chen

, Ye-Feng Li, Shu-Di Bao, Ye-Jiao Zhang:
A Comparative Performance Study of Electrocardiogram-Based Human Identity Recognition. 121-126
CSE 7
- Yanqi Li, Jianzhou Liu, Shaoming Zhi:

Fully CNN-Based Pixel Level Classification Model for Urban Land Image Acquired by Unmanned Aerial Vehicle. 127-132 - Okeke Stephen, Young Jick Jang, Tae Soo Yun, Mangal Sain:

Depth-Wise Based Convolutional Neural Network for Street Imagery Digit Number Classification. 133-137 - Subin Lee, Jun-Geol Baek

:
Generative Pseudorehearsal Strategy for Fault Classification Under an Incremental Learning. 138-140
CSE 8
- Alex Erdogan, Kiran George:

Deinterleaving Radar Pulse Train Using Neural Networks. 141-147 - Da Hyeon Choi:

LYRA: an Interactive and Interactive Storyteller. 148-153 - Gregory Falco:

Participatory AI: Reducing AI Bias and Developing Socially Responsible AI in Smart Cities. 154-158 - M. D. Samrajesh, K. K. Viswanathan

:
Reliable Component Instance for Multi-tenant Software as a Service Application. 159-164
CSE 9
- Md. Ahsan Ayub

, Steven Smith, Ambareen Siraj:
A Protocol Independent Approach in Network Covert Channel Detection. 165-170 - Mangal Sain, Ki-Hwan Kim

, Young-Jin Kang, Hoon-Jae Lee:
An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing. 171-175 - Kazi Zakia Sultana, Tai-Yin Chong:

A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics. 176-181 - Mona Alkanhal

, Bharath K. Samanthula:
A Privacy-Aware Framework for Friend Recommendations in Online Social Networks. 182-187
CSE 10
- Lizong Zhang, Xiang Shen, Fengming Zhang, Minghui Ren, Binbin Ge, Bo Li:

Anomaly Detection for Power Grid Based on Time Series Model. 188-192 - Diab M. Diab, Basil AsSadhan, Hamad Binsalleeh

, Sangarapillai Lambotharan, Konstantinos G. Kyriakopoulos, Ibrahim Ghafir:
Anomaly Detection Using Dynamic Time Warping. 193-198 - Yurui Wang, Zhihui Du, Jun Jiang, Baokun Lu, Chongyu Wang:

Modeling the Parallel Efficiency of Density Functional Theory Based Jobs on Sunway TaihuLight. 199-204 - Tanhong Chen, Huiyong Li, Jianwei Niu

, Tao Ren, Guizhou Xu:
Embedded Partitioning Real-Time Operating System Based on Microkernel. 205-210
CSE 11
- Junqiu Liu, Fei Wang, Shuang Zhao, Xin Wang, Shuhui Chen:

iMonitor, An APP-Level Traffic Monitoring and Labeling System for iOS Devices. 211-218 - Donghoon Kim, Luke Sample:

Search Prevention with Captcha Against Web Indexing: A Proof of Concept. 219-224 - xiaodi Fu, Jiang Lu, Xin Zhang, Xiaokun Yang, Ishaq Unwala:

Intelligent In-Vehicle Safety and Security Monitoring System with Face Recognition. 225-229
CSE 12
- Kyuchang Chang, Jun-Geol Baek:

Univiariate Signal Preprocessing Methodology for Fault Detection in Semiconductor Manufacturing Process. 230-232 - Hiroyuki Kagami:

Estimation of the Spouting Time by the Mathematical Model That Describes the Periodic Spouting of a Geyser Induced by Boiling. 233-236 - SungEn Kim, KeeHong Ahn, SuKyoung Kim:

A Method of Educational Quality Administration Based on Hyper Meta Ontology. 237-242 - Reda Ayesha Khan, Usman Qamar

, Andleeb Aslam, Pakizah Saqib, Aleena Ahmad:
Quality Framework for Ontologies Evaluation Based on Structural Characteristics. 243-248
CSE 13
- Parvizsho Aminov, Navjot Bola, Dipti Shiralkar, Meghana Yoganarasimha:

Cloud Based Algorithm for Task Management. 249-253 - Seba Susan

, Aparna Bhutani:
A Novel Memetic Algorithm Incorporating Greedy Stochastic Local Search Mutation for Course Scheduling. 254-259 - Nasim Nezamoddini

, Amirhosein Gholami
:
Integrated Genetic Algorithm and Artificial Neural Network. 260-262 - Jae Yeol Hong, Seung Hwan Park, Jun-Geol Baek:

Segmented Dynamic Time Warping Based Signal Pattern Classification. 263-265
CSE 14
- Kyunam Cho

, Hyunseok Lee, Kideuk Bang, Sungsoo Kim:
Possibility of HPC Application on Cloud Infrastructure by Container Cluster. 266-271 - Andrew Addison, Ari Krish, Ryan Prins, Larry Ryan, Nicole Villette, Charles Andrews, Newas Azad, Daniel Bardsley, John Bauman, Jeffrey Diaz, Tatiana Didik, Komoliddin Fazliddin, Maria Gromoa:

Low-Latency Trading in the Cloud Environment. 272-282 - Jack Slater, Alan Nesbitt, Gordon Morison, Philip Boreham:

A Hybrid Cloud for Data Analytics in Electrical Substation Condition Monitoring Systems. 283-288 - Khushbu Khalid Butt

, Guo Hui Li, Muhammad Obaid Ur Rehman
:
Comparative Analysis of Hadoop Security Ad-Ons. 289-293 - Jianfeng Zou, Xueqi Jin, Lei Zhang, Yueqiang Wang, Bo Li:

A Case Study of Anomaly Detection in Industrial Environments. 294-298
CSE 15
- Honglei Zheng, Hong Guo:

Design and Implementation of Campus Service System Platform Based on Big Data. 299-302 - Yongze Sun, Zhonghua Lu

:
Financial Quantitative Big Data Platform Based on High Performance Computing. 303-307 - Takashi Yoshikawa, Susumu Date

, Yasuhiro Watashiba, Yuki Matsui, Kazunori Nozaki, Shinya Murakami, Chonho Lee, Masami Hida, Shinji Shimojo:
Secure Staging System for Highly Confidential Data Built on Reconfigurable Computing Platform. 308-313 - Monerah Al-Mekhlal, Amir A. Khwaja

:
A Synthesis of Big Data Definition and Characteristics. 314-322 - Art Sedighi, Doug Jacobson

:
Forensic Analysis of Cloud Virtual Environments. 323-329
CSE 16
- Myeonggil Choi:

The Security Risks of Cloud Computing. 330 - Anitha Ilapakurti, Sharat Kedari, Rajasekar Vuppalapati, Santosh Kedari, Jaya Shankar Vuppalapati, Chandrasekar Vuppalapati:

Human-AI Symbiosis: Decode Climate Change to Prevent Heat-Related Mortalities and to Protect Our Most Vulnerable Population. 331-338 - Chandrasekar Vuppalapati, Sharat Kedari, Anitha Ilapakurti, Santosh Kedari, Jaya Shankar Vuppalapati:

Emotional Health: A Data Driven Approach to Understand our Emotions and Improve our Health. 339-347 - Hisayoshi Sugiyama:

(Poster) Parallel and Distributed Operation of Smart Grid with Pulsed Power Transmission. 348 - Nusrat Jahan, Rakib Ul Haque, Aloke Kumar Saha

, Muhammad Firoz Mridha
, Md. Abdul Hamid
:
Identification of Expectancy, Proximity, and Compatibility of the Bengali Language. 349-354
The 17th IEEE International Conference on Embedded andUbiquitous Computing (IEEE EUC 2019)
EUC 1
- Jihe Wang, Huang Shu, Jiaxiang Zhao, Danghui Wang:

UltraGroup: Towards Deploying MobileNet to Ultra-Resource-Bounded Edge Devices. 355-360 - Bassma Aldahlan

, Zongming Fei:
A Geographic Routing Strategy with DTN Support for Vehicular Named Data Networking. 361-366 - Rodrigo da Rosa Righi, Alexandre Lima Santana, Cristiano André da Costa

, Rafael Kunst
, Guilherme Goldschmidt, Dhananjay Singh
, Madhusudan Singh
:
Reducing Cost and Time-to-Market on Supporting Driver Assistance Systems to Avoid Rear-end Collisions in Vehicles Traffic. 367-372 - Ming Wu, Qianmu Li, Shuo Wang, Jun Hou:

A Subjectivity-Aware Algorithm for Label Aggregation in Crowdsourcing. 373-378
EUC 2
- Ahmed Raza Malik, Laurel Pilon, Jennifer Boger:

Development of a Smart Seat Cushion for Heart Rate Monitoring Using Ballistocardiography. 379-383 - Ruth Sandra Harry, Raymond Joseph:

Enhancements in Anomaly Detection in Body Sensor Networks. 384-389 - Byounghyun Yoo

, Shapna Muralidharan, Chanwoong Lee, Jia Lee, Heedong Ko:
KLog-Home: A Holistic Approach of In-Situ Monitoring in Elderly-Care Home. 390-396 - Maryam Al Thawadi, Farag M. Sallabi

, Mamoun Awad
, Khaled Shuaib:
Disruptive IoT-Based Healthcare Insurance Business Model. 397-403
EUC 3
- Junhui Cai, Qianmu Li, Yini Chen, Yaozong Liu, Yi Xia, Sajjad Rahmany

:
Troubleshooting Test Method Based on Industrial Control Grammar Model. 404-409 - Gabriel Habib Medeiros Oliveira

, Renan Fonteles Albuquerque, Adriano Bessa Albuquerque:
A Comprehensive Study on Knowledge Management Applied to Embedded System Testing Processes. 410-418 - Song Xia, Hao Jiang, Yi Zhang, Duo Peng:

Internet Advertising Investment Analysis Based on Beijing and Jinhua Signaling Data. 419-426 - Chi-Yi Lin, Guan-Ying Jhu, Siang Siao:

An Innovative Queue Management System Based on Bluetooth Beacon Technology. 427-430
EUC 4
- Tian Qiu, Qianmu Li, Jun Hou, Shunmei Meng, Huaqiu Long

, Yaozong Liu:
Fusion Learning Model for Embedded Face Safe Detection and Facial Gesture Analysis. 431-435 - Rei Ito, Mineto Tsukada, Masaaki Kondo, Hiroki Matsutani:

An Adaptive Abnormal Behavior Detection using Online Sequential Learning. 436-440 - Haibo Liu, Qianmu Li, Shunmei Meng, Zhenbang Rong:

Safe Facial Multi-Attribute Feature Fusion Analysis Based on Embedded Multi-Task Learning. 441-446 - Yanxia Zhang, Andreas Girgensohn, Yulius Tjahjadi:

Activity Forecasting in Routine Tasks by Combining Local Motion Trajectories and High-Level Temporal Models. 447-452
EUC 5
- Zheng Li:

Scheduling of Two-Phase Mixed-Criticality Systems on Memory Shared Multi-Core Platforms. 453-458 - Xiaohui Wei, Ruyu Zhang, Yuanyuan Liu, Hengshan Yue, Jingweijia Tan:

Evaluating the Soft Error Resilience of Instructions for GPU Applications. 459-464
EUC 6
- Masaya Yoshikawa, Yusuke Nozaki:

Side-Channel Analysis for Searchable Encryption System and its Security Evaluation. 465-469 - Chaoxian Lv, Qianmu Li, Huaqiu Long

, Yumei Ren, Fei Ling:
A Differential Privacy Random Forest Method of Privacy Protection in Cloud. 470-475 - Gianpiero Costantino, Ilaria Matteucci

:
CANDY CREAM - Hacking Infotainment Android Systems to Command Instrument Cluster via Can Data Frame. 476-481 - Oluwaseyi Ajayi, Melvin Cherian, Tarek N. Saadawi:

Secured Cyber-Attack Signatures Distribution using Blockchain Technology. 482-488 - Xiao Chen:

A Stable Task Assignment Scheme in Crowdsourcing. 489-494
EUC 7
- Min-Kyu Kim, Dong-Jun Park, Jun-Woo Lee, Se-Jin Ahn, Myung-Jun Shin:

Quantitative Evaluation of TUG Test with IMU and sEMG Sensors in Wearable Device (Poster). 495 - Dong-Hyun Lee, Dong-Jun Park, Myung-Jun Lee, Se-Jin Ahn, Weui-Bong Jeong:

Quantification of Hand Motor Disturbance in Parkinson's Patients using sEMG Sensor (Poster). 496 - Dong-Jun Park, Jun-Woo Lee, Myung-Jun Lee, Se-Jin Ahn, Weui-Bong Jeong:

Wearable IMU Sensor for Monitoring Hand Motion Disorder in Parkinson's Patients (Poster). 497 - Zhijun Zhao, Zhengwei Jiang, Yueqiang Wang, Guoen Chen, Bo Li:

Experimental Verification of Security Measures in Industrial Environments. 498-502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














