This book comprises selected papers from the 14th International Conference on Multimedia and Ubiquitous Engineering (MUE 2020) and the 14th International Conference on Future Information Technology (Future Tech 2020). And this book presents the latest developments in the field of ubiquitous computing technologies.
It also discusses the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis, and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.
This book is a great resource for students, researchers, and professors working in the field of ubiquitous computing.
Author(s): James J. Park, Vincenzo Loia, Yi Pan, Yunsick Sung
Series: Lecture Notes in Electrical Engineering, 716
Publisher: Springer Singapore
Year: 2021
Language: English
Pages: 200
City: Singapore
Message from the FutureTech 2020 General Chairs
Message from the FutureTech 2020 Program Chairs
FutureTech 2020 Organization
Message from the MUE 2020 General Chairs
Message from the MUE 2020 Program Chairs
MUE 2020 Organization
Contents
Research on Optimization of Knapsack Problem in Logistics Distribution
1 Introduction
1.1 Traditional Knapsack Problem Description
1.2 Particle Swarm Optimization Algorithm
2 Knapsack Problem Solution in Logistics Distribution
2.1 Simulated Annealing and Binary Particle Swarm Optimization (BPSOSA)
2.2 Particle Fitness Update
2.3 Weight, Learning Factor Update
2.4 Individual Optimal Solution and the Global Optimal Solution Update
2.5 Path Adjustment
3 Logistics Simulation System
3.1 Simulation Results and Analysis
4 Conclusion
References
Construct of Data Compression System for Urgent Data Transmission in Smart Dust Environment
1 Introduction
2 Previous Work
3 Hierarchical Transmit Method
3.1 The Normal Data Threshold Filtering Phase (The First Phase)
3.2 The Normal Data Integration Phase (The Second Phase)
4 Experiment
5 Conclusion
References
Entity Summarization in Fuzzy Knowledge Graph Based on Fuzzy Concept Analysis
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Fuzzy Knowledge Graph
3.2 Problem Description
3.3 Proposed Approach
4 Conclusion
References
Interlacing Data to Classify Software in Linear Regression Approach
1 Introduction
2 Linear Regression in Machine Learning
2.1 Linear Regression in Software Classification
2.2 The Basic Approach of Interlacing Data
3 Interlacing Data in Linear Regression
4 Experimental Evaluation
5 Conclusion
References
Blockchain and Trusted Execution Environment Based Fairness Incentive Mechanism in Crowdsensing
1 Introduction
2 Related Work
3 Architecture and Operations of Our Proposed System
4 Experiment
5 Analysis and Conclusion
References
Identifying Critical Topics for Successful Games in Game Reviews by Applying Latent Dirichlet Allocation
1 Introduction
2 Background
3 Topic Modeling Analysis
3.1 Theoretical Framework
3.2 Methodology
4 Discussions
4.1 Stimulation—Response—Desire—Goal (SRDG) Model
4.2 Application and Development of the Model
5 Conclusion
References
Design of a Multi-core IP-NDN Gateway for Smart Dust IoT Environments
1 Introduction
2 Smart Dust IoT System
3 IP-NDN Gateway
4 Conclusion and Future Studies
References
A Study on Protocol Comparison for Energy-Efficient Network Configuration in Mobile Edge Computing
1 Introduction
2 Related Work
2.1 Mobile Edge Computing
2.2 Network Configuration of WSNs
3 A Comparative Study
3.1 Problem Statement
3.2 Study Condition
3.3 LEACH for MEC
3.4 PEGASIS for MEC
4 Performance Evaluation
4.1 Simulation Environment
4.2 Simulation Result
5 Conclusion
References
A Benchmark Test for Stateless Stream Partitioning Over Distributed Network Environments
1 Introduction
2 Related Work
3 Design of Benchmark Tests
3.1 Comparative Measures
3.2 Application Configuration Cases
4 Experimental Evaluation
4.1 Comparison of Average Transmission Time
4.2 Comparison of Load Balancing
5 Conclusions
References
Development of a Non-contact Autostereoscopic 3D Button Using Artificial Intelligence
1 Introduction
2 Button Device with Lenticular Display
3 Pointing Algorithm Using Deep Learning
4 Experimental Result
5 Conclusion and Future Work
References
Automatic Computing Device Selection Scheme Between CPU and GPU for Enhancing the Computation Efficiency
1 Introduction
2 Automatic Computing Device Selection Scheme
3 Performance Evaluations
3.1 Experimental Environment
3.2 Experimental Results
4 Conclusions and Future Works
References
Experimentation of Human Activity Recognition by Using Accelerometer Data Based on LSTM
1 Introduction
2 Related Work
3 Experiments
3.1 Data Set Description
3.2 Experimental Setup
3.3 Experimental Results
4 Conclusion
References
Graph and Convolution Recurrent Neural Networks for Protein-Compound Interaction Prediction
1 Introduction
2 Related Work
3 Materials and Method
3.1 Graph Neural Network for Molecular Graph
3.2 Convolutional Neural Network for Protein Sequence
3.3 Recurrent Neural Networks
3.4 Experiments
4 Results and Discussion
5 Conclusion
References
Current Status and Forecast of Blockchain Application in Security Technology
1 Introduction
2 Blockchain
3 Utilization of Blockchain in Security
3.1 IoT Security Using Blockchain
3.2 Safe Messaging Platform Using Blockchain
3.3 Blockchain-Based PKI
3.4 Improvement and Expansion of DNS Using Blockchain
3.5 Problems of Blockchain Applications
4 Forecast of Blockchain in Security
5 Conclusion
References
Blockchain-Based Secure Digital Twin Framework for Smart Healthy City
1 Introduction
2 Proposed Framework
3 Sequence Diagram
4 Conclusion
References
Blended Learning as an Effective Approach to English Language Teaching at the Institutions of Higher Learning—A Case Study
1 Introduction
2 Methods
2.1 Methodology
2.2 Study Design
3 Results and Discussion
4 Conclusion
References
Cultural Discourse in Human-Computer Interactions: Linguistic Aspects of Digital Communication
1 Introduction
1.1 Literature Review
2 Research
2.1 Research Design
2.2 Research Question
2.3 Research Findings
2.4 Research Limitations
3 Discussion
4 Conclusion
References
Hierarchical Similarity Hash for Fast Malware Detection
1 Introduction
2 Similarity Hash
3 Hierarchical Similarity Hash
4 Conclusions
References
A Study on Dropout Techniques to Reduce Overfitting in Deep Neural Networks
1 Introduction
2 The Concept of Dropout in Deep Neural Networks
3 The Effect of Applying Dropout in a Deep Neural Network
3.1 The Effect of Dropout Rates
3.2 The Effect of Dropout According to the Number of Nodes
3.3 Discussion
4 Conclusion
References
Improvement Efficiency of Fingerprint Database Using Mathematical Methods
1 Introduction
2 Materials and Methods
2.1 Initial Experiment Setup
3 Results
4 Discussion
5 Conclusion
References
Academic Paper Personalized Search Based on Interest Subject Tracking and Search Performance Evaluation
1 Introduction
2 Personal Interest Subject Tracking
3 Academic Paper Personalized Search by Interest Tracking
4 Personalized Search Performance Evaluation
4.1 Precision@10 Evaluation and Analysis
4.2 MAP Evaluation and Analysis
5 Conclusion
References
Implementation of an Authentication System GTPass
1 Introduction
2 GTPass System
3 Workflow and Structure of GTPass
3.1 Interface of GTPass
4 Conclusion
References
Designing a Predictive Model for Efficient Learning Outcomes in Korean Education
1 Introduction
2 Related Works
2.1 Decision Tree Algorithm
2.2 Korean Based Education Data Mining
3 Design of Directivity Index for University Entrance
3.1 Classification of Learners Past Data
3.2 Creation of Rules for Learner Success or Failure Prediction Analysis
4 Performance Evaluation
5 Conclusion
References
Development of Korean Tourist Information Platform Based on Big Data
1 Introduction
2 Related Work
2.1 Unstructured Data Analysis Technology
2.2 Tourist Information Platform
3 Proposed Method
3.1 Data Collection and Storage Construction
3.2 Construction of Sentiment Dictionaries for Opinion Mining Analysis
4 Performance Evaluation and Analysis
5 Conclusion
References
Analysis Design Study for Fake News Identification and Evaluation
1 Introduction
2 Previous Works
3 Materials and Methods
3.1 Model
3.2 Case Study Test
4 Conclusion
References
System Architecture with Respect to Indoor Localization
1 Introduction
2 Technology Review
3 Related Works
3.1 Smart Campus
3.2 Rainforest of Americas
4 Comparison
5 Conclusions
References
Deep Learning Adoption Blockchain Secure Framework for Cyber Physical System
1 Introduction
2 Related Work
2.1 CPS Challenges
2.2 Key Considerations
3 Proposed Framework
4 Conclusion
References