The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The deep neural network (DNN) that models characteristics of general blood test (GBT) results was used in clinical opinions generation. The DNN that generates clinical opinions has the complex structure, which causes overfitting problem. The relatively small size of medical dataset also contributes to the occurrence of overfitting. In order to deal with overfitting, we apply two techniques that solve...
This paper proposes the rehabilitation treatment coach robot which will help at-home patients do their rehabilitation exercises at home without any professional trainers. The coach robot is designed to be cheap enough for patients to afford it. The robot suggests the rehabilitation program and corrects the posture of the patients during the exercise. The deep neural network is used for posture correction...
Testing of mobile applications becomes more importantas the usage of smartphones increases. Many studiesuse Monkey, a basic testing tool provided by Android. WithMonkey, however, it is hard to replay the behavior of actualusers. In this work, we present a mobile app testing methodthat automatically records and replays user event logs on thesmartphone. From replay testing experiments, we have shownthat...
Short Message Service (SMS) is one of the most popular services in the Global System for Mobile (GSM) and many challenges for security arise from the development of message transmission among the broadband network. Recently, an interesting technique called signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented, with better...
With the wide application of location-based social networks (LBSNs), point-of-interest (POI) recommendation has become one of the major services in LBSNs. The behaviors of users in LBSNs are mainly checking in POIs, and these checking-in behaviors are influenced by user's behavior habits and his/her friends. In social networks, social influence is often used to help businesses to attract more users...
In this paper, a new Smartphone sensor based algorithm is proposed to detect accurate distance estimation. The algorithm consists of two phases, the first phase is for detecting the peaks from the Smartphone accelerometer sensor. The other one is for detecting the step length which varies from step to step. The proposed algorithm is tested and implemented in real environment and it showed promising...
Kaleido is a novel data system for multi-device synchronization. According to the theories of conflict-free replicated data types, Kaleido enables clients to synchronize replicated data types with operations, and gurantees high availability and eventual consistency. Implemented as a back-end as a service, Kaleido server is scalable so as to deal with a huge amount of requests from massive clients...
Accurate estimations of footfall count have several important uses, examples include monitoring crowd movement, allocation of emergency services, retail planning, transport planning, and so on. To estimate footfall count, data logs from telco's Location Based Services (LBS) system can be used. LBS records indicate the cellular towers that mobile phone users are connected to at a given date and time...
Traffic congestion has become a worldwide problem, seriously restricting the performance of transport network. Association of congested links is an essential factor in the formation of traffic congestion, while it lacks enough research. In this paper, a methodology ARM-K combining K-means clustering and association rules mining is proposed to discover the relations of congested links. Specifically,...
Popularization of mobile devices promotes the development of E-commerce in which users produce plenty of implicit feedbacks (e.g., click, adding to wish list, purchase). Generally, the implicit feedback can be divided into the certain implicit feedback like purchase and the uncertain implicit feedback like click. However, certain implicit feedback is sparse while uncertain implicit feedback like click...
The prevalence of GPS devices has facilitated collection of large-scale trajectories. Fresh positions of moving objects can be sampled periodically and sent to servers for data analytics and query processing. Online trajectory simplification is a compression task usually conducted at the sensor side and serves as a key component to reduce network communication overhead. In this paper, we study a new...
Nowadays, Radio Frequency Identification (RFID) technology has been widely employed in the fields of object positioning, tracking and monitoring. However, there are a large number of redundant data generated in RFID systems due to duplicate detection and cross detection. Since RFID data is usually streaming, uncertain and mobile data, traditional static data and data stream filtering strategies cannot...
In this paper, user log data of mobile notificationsare collected from a real mobile news application, and notificationopening rate and reaction time are identified as key parametersthat characterize user behavior. The results indicate that notificationopening patterns depend on the content of notifications, the time at which they are sent, the activeness of users, andthe reaction time. This paper...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Information retrieval techniques play vital role in the era of information technology. Inverted index is one of the technique to retrieve the information/data related with certain keyword. This technique gives faster results to retrieve relevant document from billions of documents, which contains specified keyword. In order to support wrongly spelled keyword, many techniques have been proposed including...
The recent increase of fine dust levels has resulted in substantially harmful effects on human health. This paper proposes an easily accessible and cost-efficient dust monitoring system that retrieves fine dust levels within a local area. An Arduino-based IoT device is connected to a fine dust sensor and provides dust-level data to a mobile application in real time. The proposed system provides new...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.