{"title":"Intelligent Surveillance in Smart City Using 3D Road Monitoring","authors":"Aroma Tariq, Saqib Ali, X. Xing, Guojun Wang","doi":"10.1109/iSCI50694.2020.00013","DOIUrl":"https://doi.org/10.1109/iSCI50694.2020.00013","url":null,"abstract":"Traffic accidents and lack of road monitoring are never-ending cause of tribulation in metropolitan areas. A solution is required to tackle with these problems. The human eye is not capable of capturing each and everything happening on the roads. To build a secure environment in smart cities an intelligent surveillance system is required to keep an eye on what is happening on roads. The current security measures for surveillance are not enough to capture everything. For instance, single view and fixed CCTV cameras are installed on roads. They are only capable of providing information on a fixed angle. The current solution lacks at recognizing the type, model, and license plate of the vehicle. Therefore, the objective of this paper is to develop a 3D road monitoring model to provide intelligent surveillance in smart cities. The proposed solution is capable of performing efficient vehicle detection along with sensing unusual activities on the road. For this, pre-trained models trained using deep neural networks for vehicle detection, license plate recognition, and unusual activity detection are combined through stacking. It will reduce the man work, time, and complexity of the traffic controls.","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127158685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning-based Update-time Prediction for Battery-friendly Passenger Information Displays","authors":"P. Herrmann, Ergys Puka, T. Skoglund","doi":"10.1109/iSCI50694.2020.00016","DOIUrl":"https://doi.org/10.1109/iSCI50694.2020.00016","url":null,"abstract":"Personal Information Displays (PID) at bus stops help making the usage of public transport more attractive. If no electric grid is nearby, however, the installation of PIDs is very expensive due to the high wiring costs. To resolve this issue, the partners of the R&D project IoT-STOP develop a novel PID system that will be independent from the access to power lines. The system uses e-papers as displays that can be accessed using a cellular network. To prevent long, energy-intensive idle listening, the network receiver operates only when the passenger information, in particular, the Expected Times of Arrival (ETA) of the buses, is updated. Between two updates, the receiver is switched off such that adjustments after sudden events are not possible. Therefore, the update periods have to be carefully selected. In this paper, we introduce a predictor that estimates time intervals between updates. Our method is based on linear regression using samples of previous bus rides to forecast arrival times. Its predictions are applied by an algorithm to detect areas during the journey of a bus at which its ETA at a later stop changes with a certain probability. The forecasted times for passing such areas are then selected to update the PID at this stop. In addition, we present a number of tests of the predictor carried out at some bus stops in Bergen, Norway. The results show that the proposed method indeed predicts sensible update times of the PID systems.","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115191156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Allan Jason C. Arceo, Renee Ylka N. Borejon, Mia Chantal R. Hortinela, A. Ballado, A. Paglinawan
{"title":"Design of an E-Attendance Checker through Facial Recognition using Histogram of Oriented Gradients with Support Vector Machine","authors":"Allan Jason C. Arceo, Renee Ylka N. Borejon, Mia Chantal R. Hortinela, A. Ballado, A. Paglinawan","doi":"10.1109/iSCI50694.2020.00008","DOIUrl":"https://doi.org/10.1109/iSCI50694.2020.00008","url":null,"abstract":"The usual way of checking the attendance in a class has its own drawbacks. To be able to resolve it, automated attendance systems were introduced. In this paper, the design and development of an e-attendance checker using a facial recognition system were implemented. It can scan the faces of multiple students in a standard classroom setup. A commonly used approach for face detection called Histogram of Oriented Gradients (HOG) with Support Vector Machine (SVM) was applied to examine the effect of luminance of the surrounding, the facial orientation of the student and so as their distance from the camera in the facial detection and recognition. The obtained attendance will then be uploaded to a database with authentication. It was found that the system has an accuracy of 95.65% and can detect and recognize up to 37 students. It is suggested that the classroom should have a luminance level of about 217.39 lux or higher to achieve a better accuracy performance of the system. As for the analysis of the effect of distance in the system, it is claimed that the distance of the student does not affect the accuracy of the system. Lastly, it is suggested that the face angles of the subject should be directly facing the camera to achieve a more accurate recognition result.","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121345825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges and Trends of Android Malware Detection in the Era of Deep Learning","authors":"Sancheng Peng, Lihong Cao, Yongmei Zhou, Jianguo Xie, Pengfei Yin, Jianli Mo","doi":"10.1109/iSCI50694.2020.00014","DOIUrl":"https://doi.org/10.1109/iSCI50694.2020.00014","url":null,"abstract":"Android, the most popular open source mobile platform, attracts a lot of developers who have produced numerous widespread applications (apps). It also draws attackers who have delivered a large amount of malwares to unsuspecting users, due to its open nature. This is not only a threat to national security, but also affect our daily lives. Deep learning has become one of the most popular technologies, and has gained an appreciation to academic and industrial researchers, so it will inevitably become an essential tool to perform complex analysis in a broad application fields. It is appealing to an increasing amount of research ranging from popular topics extraction to Android malware. In this paper, we provide a comprehensive investigation of Android malware detection, and discuss the characteristics of malware and its analysis methods based on deep learning. The secure ecology of Android smartphone based on deep learning is also presented. In addition, research challenges relevant to realworld issues by applying deep learning in smartphone security are discussed, focusing on research issues such as the obtain of optimal parameters, processing of adversarial sample, collection of large scale sample dataset, defence against attack, possession of interpretability and traceability. Our goal is to provide a widespread research guideline to the existing and ongoing efforts via deep learning for smartphone malware, to help researchers better understand the existing work, and to design more and more effective mechanisms to detect smartphone malware.","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126258050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-government Deep Recommendation System Based on User Churn","authors":"Yanan Wang, Airong Quan, Xiaonan Ma, Junqing Qu","doi":"10.1109/iSCI50694.2020.00011","DOIUrl":"https://doi.org/10.1109/iSCI50694.2020.00011","url":null,"abstract":"At present, all major government-related APPs have basically achieved one-stop operation. However, due to the various categories of government affairs, how to provide users with personalized recommendation services based on user behavior is a problem that smart government needs to solve. Aiming at the problems of sparse user government behavior data and difficulty in mining hidden features, this paper proposes a two-tower model that integrates user churn. A deep neural network is constructed to characterize user item characteristics, and the influence of user churn factor on feature weights is also considered. At the same time, the random forest algorithm is introduced to weight the characteristics of user churn, and the characteristics of the two towers model are combined to achieve personalized ranking recommendation. The experimental results show that our proposed model is better than the original features, and this model has been successfully deployed in the “My Ningxia” government recommendation system, and the user experience has been significantly improved.","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Autonomous Parking Space Planning System Based on Pattern Searching Algorithm","authors":"Xinxin Huang, Yingguo Gao, Xiaohui Duan","doi":"10.1109/iSCI50694.2020.00009","DOIUrl":"https://doi.org/10.1109/iSCI50694.2020.00009","url":null,"abstract":"In the field of static traffic, parking space planning and moving line planning are currently carried out manually over a period of more than one week, which is inefficient and cannot be optimized automatically. Therefore, this paper proposes and implements an autonomous parking space planning system based on pattern searching algorithm, which is divided into four modules: image preprocessing module, parking area segmentation module, parking space planning module, and image post-processing module. We use the system proposed in this paper to test the simulated parking lots of the same area. The result is that the parking space plot ratio can reach 48.68%. We also optimize an existing actual parking lot. The number of parking spaces in the optimized parking lot has increased by 20% compared with the original parking lot.","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE iSCI 2020 Organizing and Program Committees","authors":"","doi":"10.1109/isci50694.2020.00007","DOIUrl":"https://doi.org/10.1109/isci50694.2020.00007","url":null,"abstract":"","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Qasim Afser Rizvi, Pin Liu, Guojun Wang, Muhammad Arif
{"title":"Prediction of Parkinson's Disease using Principal Component Analysis and the Markov Chains","authors":"Syed Qasim Afser Rizvi, Pin Liu, Guojun Wang, Muhammad Arif","doi":"10.1109/iSCI50694.2020.00015","DOIUrl":"https://doi.org/10.1109/iSCI50694.2020.00015","url":null,"abstract":"Parkinson's Disease (PD) is one of the neurodegenerative diseases (ND) that affects the whole life of the patients and make him/her benumb. Copious efforts have been conducted and another fraction of scientists is functional to figure out pre-diagnosis of the neurodegeneration. This proposal concomitantly tries to solve the problem for diagnosing as well as classifying the PD. With the prescribed prospect, Principal Component Analysis (PCA) is being used for extricating PD for its foremost advantage of dimension reduction with a minimal loss of information, in addition, Markov chain Model applied for classifying the PD based on the Unified Parkinson's Disease Rating Scale (UPDRS) for the reason that the chronic diseases cannot be demarcate in a deterministic pattern.","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Emotion Analysis in Text Based on Deep Learning","authors":"Lihong Cao, Sancheng Peng, Pengfei Yin, Yongmei Zhou, Aimin Yang, Xinguang Li","doi":"10.1109/iSCI50694.2020.00020","DOIUrl":"https://doi.org/10.1109/iSCI50694.2020.00020","url":null,"abstract":"With the rapid development of mobile Internet, and the popularization of e-commerce and social networks, people have changed from the simple users of network information to the main publishers of network information. Thus, a large number of various network data have been generated, and a large part of these data contains negative emotions. Mining these data can make us better understand the views and positions of netizens, and help to grasp the key information of network public opinion. In this paper, we provide an introduction for the background knowledge of emotion analysis, including different definitions and classification methods of emotion. Then, we summarize the related models of deep learning, as well as the main emotion analysis methods in text based on deep learning, and make a detailed introduction and comparison on these methods. Finally, we enumerate the challenges of emotion analysis in text, and the future research trend for emotion analysis.","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132202518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Blockchain-Driven Network Log Management System","authors":"M. Rakib, S. Hossain, Mosarrat Jahan, U. Kabir","doi":"10.1109/iSCI50694.2020.00019","DOIUrl":"https://doi.org/10.1109/iSCI50694.2020.00019","url":null,"abstract":"Log data is crucial to detect mischievous activities conducted in a computing environment. Traditional log management systems that depend on cloud and centralized storage servers are vulnerable to a single point of failure and lack transparency and trust since the adversaries tamper log records. In literature, blockchain is used to design log storage to resolve these issues. Although some solutions have been introduced, the existing works still cannot guarantee log data confidentiality, lack of efficient query mechanism, real-time implementation, and performance analysis. In this paper, we propose a blockchain-based network log data storage, query, and audit system. We have implemented and deployed the scheme in physical networking environment to collect log records. Our system ensures transparency, data accountability, and data confidentiality and incurs low overhead for performance analysis. Our work demonstrates the feasibility of blockchain to build a time-efficient log management system while ensuring the privacy of log data.","PeriodicalId":433521,"journal":{"name":"2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132657901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}