default search action
BDIOT 2019: Melbourne, VIC, Australia
- Proceedings of the 3rd International Conference on Big Data and Internet of Things, BDIOT 2019, La Trobe University, Melbourne, VIC, Australia, August 22-24, 2019. ACM 2019, ISBN 978-1-4503-7246-6
Data Engineering and Big Data Technology
- Mohammed Saleh, Thair Khdour, Mahmoud Qasaymeh:
Analysis of AMI, Smart Metering Deployment and Big Data Management Challenges. 3-7 - Meina Song, Xiangyu Xu, Haihong E:
Research and Top-level Framework Design on Unified Resource Management of Big Data in Strategic Consulting. 8-12 - Ramanathan Venkatraman, Sitalakshmi Venkatraman:
Big Data Infrastructure, Data Visualisation and Challenges. 13-17 - Syamsul Syafiq, Marshima Mohd Rosli, Maslina Daud, Abdul Fuad Abdul Rahman, Mohd Nasrul Taufiq Salleh, Farhan Arif Mohamad:
Smart Energy Monitoring System for Residential in Malaysia. 18-22 - Ralf Luis de Moura, Ludmilla Bassini Werner, Alexandre Gonzalez:
Management and Ownership: A Data Strategy in the Industry 4.0 Context. 23-28 - Edwin Shen, Justin Shen, Tsorng-Lin Chia:
Development of an App to Support Self-monitoring Smartphone Usage and Healthcare Behaviors in Daily Life. 29-34 - Intan Salwani Mohamed, Nur Husniah Muhammad Muhayyidin, Nabilah Rozzani:
Auditing and Data Analytics Via Computer Assisted Audit Techniques (CAATS): Determinants of Adoption Intention Among Auditors in Malaysia. 35-40 - Jia Shun Low, Zahra Ghafoori, James C. Bezdek, Christopher Leckie:
Seeding on Samples for Accelerating K-Means Clustering. 41-45
Communication and Signal System
- Duan-Yu Chen, Tsu-Yang Lin, Guo-Ruei Chen:
Robust Vision-Based Daytime Vehicle Brake Light Detection Using Two-Stage Deep Learning Model. 47-50 - Kingsley Nketia Acheampong, Wenhong Tian, Addis Abebe Assifa:
Redefining Learning in Visual Comparison with Spatio-relational Context-aware Representations. 51-55 - Amar Lokman, R. Kanesaraj Ramasamy:
SMART TOILET: Threats and Challenges Identifying Human Presence using IoT Sensors. 56-60 - Pankaj Verma, Brahmjit Singh:
Weighted Eigenvalues based Spectrum Sensing for Cognitive Radio Systems. 61-64 - Farah Ditha Farizi, Shaun Bangay, Sophie McKenzie:
Facial Cues for Deception Detection in Virtual Reality Based Communication. 65-69 - Sofiane Zemouri, Yiannis Gkoufas, John Murphy:
A Machine Learning Approach to Indoor Occupancy Detection Using Non-Intrusive Environmental Sensor Data. 70-74
Internet of Things and Key Technology Applications
- Xinxiao Li, Akira Kuroda:
Integrated Visualization with Controllable Deep Linking for Distributed Datasets. 77-82 - Muna Al-Hawawreh, Elena Sitnikova, Frank T. H. den Hartog:
An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things. 83-87 - Venushini A, P. Rajendran, Yogan A, L. Nadarajah, R. Kanesaraj A, L. Ramasamy:
A Cloud-Based Implementation of IoT System in Recycle Industry. 88-92 - Junwei Geng, Lin Qin:
Research and Application of Community Population Information Association Model Based on IoT Multi-device Mining. 93-98 - Fahad Asmi, Muhammad Azfar Anwar, Rongting Zhou, Muhammad Asim Nawaz, Faizan Tahir:
Predicting Functional Transparency and Privacy Concerns as Future Challenge for Diffusion of IOT and Blockchain. 99-104 - Punyisa Kuendee:
Condition Monitoring of Refrigeration Compressor Using Sound Signal Based on Convolutional Neural Networks. 105-109 - Khanista Namee, Chayanut Pasing:
Medical Devices Indoor and Outdoor Location Identification using NB-IoT and Realtime Database. 110-114 - Khanista Namee, Ghadeer Mohsen Albadrani:
Applying IoT, Web Real-Time Communication and Cloud Computing to Maximize Emergency Medical Service (EMS) Efficiency. 115-119
Information Technology and Security
- Mohit Dua, Aishwarya Wesanekar, Vishwas Gupta, Mayank Bhola, Shelza Dua:
Color Image Encryption using Synchronous CML-DNA and Weighted Bi-objective Genetic Algorithm. 121-125 - Muna Al-Hawawreh, Elena Sitnikova:
Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network. 126-130 - Tu Xing:
The Effect of Complex Visual Experiences and User Interaction on Attitudes and Intentions in Luxury Purchase. 131-134 - Jyoti Kaubiyal, Ankit Kumar Jain:
A Feature Based Approach to Detect Fake Profiles in Twitter. 135-139
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.