Search Results - "2014 IEEE 17th International Conference on Computational Science and Engineering"
-
1
Classification of Electrocardiogram Signals with Deep Belief Networks
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…This paper introduces an electrocardiogram beat classification method based on deep belief networks. This method includes two parts: feature extraction and…”
Get full text
Conference Proceeding -
2
Dolphin: Ultrasonic-Based Gesture Recognition on Smartphone Platform
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…User experience of smart mobile devices can be improved in numerous scenarios with the assist of in-air gesture recognition. Most existing methods proposed by…”
Get full text
Conference Proceeding -
3
Performance Comparison and Evaluation of Web Development Technologies in PHP, Python, and Node.js
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Large scale, high concurrency, and vast amount of data are important trends for the new generation of website. Node.js becomes popular and successful to build…”
Get full text
Conference Proceeding -
4
A Novel Resource Scheduling Approach in Container Based Clouds
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Cloud computing is a new paradigm to deliver computing resources to customers in a pay-as-you-go model. In this paper, the recently emerged container-based…”
Get full text
Conference Proceeding -
5
Connectivity Results of Hierarchical Cubic Networks as Associated with Linearly Many Faults
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…We establish a general fault-tolerance property for the interesting hierarchical cubic networks, when a linear number of vertices are removed from such a…”
Get full text
Conference Proceeding -
6
A Novel Routing Algorithm Based on Virtual Topology Snapshot in LEO Satellite Networks
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Nowadays, communication technology is changing rapidly and satellite communication, as an important communication pattern, is playing a more and more important…”
Get full text
Conference Proceeding -
7
Vehicle State Estimation Using Cubature Kalman Filter
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…The vehicle state is of significant to examine and control vehicle performance. But some vehicle states such as vehicle velocity and side slip angle which are…”
Get full text
Conference Proceeding -
8
A Smart Home Architecture Based on Resource Name Service
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Smart home contains centralized controlled lights, Heating, Ventilation and Air Conditioning (HVAC), appliances, security locks of gates and doors and other…”
Get full text
Conference Proceeding -
9
Enabling Query of Frequently Updated Data from Mobile Sensing Sources
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…The Internet of Things (IoT) paradigm connects everyday objects to the Internet and enables a multitude of applications with the real world data collected from…”
Get full text
Conference Proceeding -
10
A Real-Time Hand Gesture Recognition Approach Based on Motion Features of Feature Points
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Dynamic hand gesture recognition enables people to communicate with computers naturally without any mechanical devices. Due to the spread of depth sensor such…”
Get full text
Conference Proceeding -
11
A Neighbor Discovery Algorithm in Network of Radar and Communication Integrated System
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Networking Radar-Communication Integrated System (RCIS) promises an improved performance of radar and communication system platform by expanding scanning range…”
Get full text
Conference Proceeding -
12
Self-Stabilizing Selection of Influential Users in Social Networks
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Selection of Influential Users is an essential task in influence propagation schemes in social networks. Considering the phenomenon of asymmetric influences…”
Get full text
Conference Proceeding -
13
A Two-Phase Context-Sensitive Service Composition Method with the Workflow Model in Cyber-Physical Systems
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…The requirement of integrating a large number of heterogeneous cyber and physical entities in cyber-physical systems (CPSs) motivates the use of a…”
Get full text
Conference Proceeding -
14
Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…A Connected Dominating Set (CDS) is a subset V' of V for the graph G(V,E) and induces a connected subgraph, such that each node in V -V' is at least adjacent…”
Get full text
Conference Proceeding -
15
IoT Information Service Composition Driven by User Requirement
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Several kinds of sensors would be widely deployed with the development of the Internet of things (IoT). Each IoT information service provides individual…”
Get full text
Conference Proceeding -
16
False Target Deceptive Jamming for Countering Missile-Borne SAR
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…A false target deceptive jamming method for countering missile-borne SAR is proposed in this paper, which is on the basis of false target phase template…”
Get full text
Conference Proceeding -
17
A Secret Key Extraction Technique Applied in Vehicular Networks
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Vehicular Ad hoc network (VANET) is an emerging technology that supports several applications related to safety and comfort. Its life saving characteristic has…”
Get full text
Conference Proceeding -
18
A Novel Routing Scheme for LEO Satellite Networks Based on Link State Routing
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…The low earth orbit (LEO) satellite networks are characterized by their significant dynamics of topology and traffic load which pose huge challenge to the…”
Get full text
Conference Proceeding -
19
Alljoyn Based Direct Proximity Service Development: Overview and Prototype
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…Proximity awareness, the ability to actively (or passively) and continuously search for relevant value in one's physical proximity, is at the core of mobile…”
Get full text
Conference Proceeding -
20
A Novel Slack-Stealing Scheduling Algorithm for Hard-Real-Time Multiple-Processors System
Published: IEEE 01.12.2014Published in 2014 IEEE 17th International Conference on Computational Science and Engineering (01.12.2014)“…When a permanent fault occurs in real-time system with multiple-processors, the slack distribution for different instances of the same task is unfair. The task…”
Get full text
Conference Proceeding