{"title":"FRDV: A DTN Routing Based on Human Moving Status in Urban Environments","authors":"Wenzao Li, Bing Wan, Zhan Wen, Jianwei Liu, Yue Cao, Tao Wu, Jiliu Zhou","doi":"10.1007/978-3-030-00018-9_31","DOIUrl":"https://doi.org/10.1007/978-3-030-00018-9_31","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"28 1","pages":"344-355"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80312997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Application of ATC Operation Security Based on Data Mining","authors":"Zhaoyue Zhang, Jing Zhang, Sen Wang","doi":"10.1007/978-3-030-00018-9_54","DOIUrl":"https://doi.org/10.1007/978-3-030-00018-9_54","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"83 1","pages":"617-625"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77133088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Baojia Wang, Pingzeng Liu, Chao Zhang, Junmei Wang, Liu Peng
{"title":"Prediction of Garlic Price Based on ARIMA Model","authors":"Baojia Wang, Pingzeng Liu, Chao Zhang, Junmei Wang, Liu Peng","doi":"10.1007/978-3-030-00006-6_66","DOIUrl":"https://doi.org/10.1007/978-3-030-00006-6_66","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"731-739"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76178684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible Data Hiding in Partially-Encrypted Images","authors":"Haishan Chen, Wien Hong, J. Ni, Tung-Shou Chen","doi":"10.1007/978-3-030-00012-7_61","DOIUrl":"https://doi.org/10.1007/978-3-030-00012-7_61","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"112 1","pages":"670-679"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87468993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Benchmark Performance Testing Method for Cluster Heterogeneous Network Based on STC Platform","authors":"Junhua Xi, Kouquan Zheng","doi":"10.1007/978-3-030-00009-7_21","DOIUrl":"https://doi.org/10.1007/978-3-030-00009-7_21","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"14 1","pages":"223-231"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87672072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accurate UHF Tag Authentication Using Near-Field Capabilities","authors":"Cui Zhao, H. Ding, Kaiyan Cui, Fan Liang","doi":"10.1007/978-3-030-00018-9_2","DOIUrl":"https://doi.org/10.1007/978-3-030-00018-9_2","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"20 1","pages":"16-26"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87569029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Big Data Fusion Method of Smart Grid in the Environment of Internet of Things","authors":"Ke Jia, Xiaoming Ju, Hongbin Zhang","doi":"10.1007/978-3-030-00018-9_56","DOIUrl":"https://doi.org/10.1007/978-3-030-00018-9_56","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"155 1","pages":"636-647"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86301457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of the Product Quality Traceability System for Winter Jujube","authors":"Bangguo Li, Pingzeng Liu, Xiaotong Wu, Jianyong Zhang","doi":"10.1007/978-3-030-00009-7_62","DOIUrl":"https://doi.org/10.1007/978-3-030-00009-7_62","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"8 1","pages":"694-705"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83672785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Graph-Based Model for Inter-networking Access Control","authors":"Zhongmiao Kang, Wenting Jiang, Yan Chen","doi":"10.1007/978-3-030-00015-8_51","DOIUrl":"https://doi.org/10.1007/978-3-030-00015-8_51","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"56 1","pages":"589-597"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83976243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope","authors":"Xiang Yu, Yanbo Li, Hui Lu, Le Wang","doi":"10.1007/978-3-030-00006-6_1","DOIUrl":"https://doi.org/10.1007/978-3-030-00006-6_1","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"28 1","pages":"3-12"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82657715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}