|
|
|
Babu George and Ontario Wooden
Considering the rapid advancements in artificial intelligence (AI) and their potential implications for the higher education sector, this article seeks to critically evaluate the strategic adoption of AI in the framework of ?smart universities?. We envis...
ver más
|
|
|
|
|
|
|
Diogo Mendes, Simão Correia, Pedro Jorge, Tomás Brandão, Patrícia Arriaga and Luís Nunes
This study presents a trajectory-based person re-identification algorithm, embedded in a tool to detect and track customers present in a large retail store, in a multi-camera environment. The customer trajectory data are obtained from video surveillance ...
ver más
|
|
|
|
|
|
|
Xin Yao, Juan Yu, Jianmin Han, Jianfeng Lu, Hao Peng, Yijia Wu and Xiaoqian Cao
Generating differentially private synthetic human mobility trajectories from real trajectories is a commonly used approach for privacy-preserving trajectory publishing. However, existing synthetic trajectory generation methods suffer from the drawbacks o...
ver más
|
|
|
|
|
|
|
Songyuan Li, Hui Tian, Hong Shen and Yingpeng Sang
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it...
ver más
|
|
|
|
|
|
|
Tinghuai Ma and Fagen Song
With the popularity of location-aware devices (e.g., smart phones), a large number of trajectory data were collected. The trajectory dataset can be used in many fields including traffic monitoring, market analysis, city management, etc. The collection an...
ver más
|
|
|
|
|
|
|
Jianxi Yang, Manoranjan Dash and Sin G. Teo
As mobile phone technology evolves quickly, people could use mobile phones to conduct business, watch entertainment shows, order food, and many more. These location-based services (LBS) require users? mobility data (trajectories) in order to provide many...
ver más
|
|
|
|
|
|
|
Yustus Eko Oktian, Elizabeth Nathania Witanto and Sang-Gon Lee
Since the inception of the Internet of Things (IoT), we have adopted centralized architecture for decades. With the vastly growing number of IoT devices and gateways, this architecture struggles to cope with the high demands of state-of-the-art IoT servi...
ver más
|
|
|
|
|
|
|
Elias Dritsas, Andreas Kanavos, Maria Trigka, Gerasimos Vonitsanos, Spyros Sioutas and Athanasios Tsakalidis
Privacy Preserving and Anonymity have gained significant concern from the big data perspective. We have the view that the forthcoming frameworks and theories will establish several solutions for privacy protection. The k-anonymity is considered a key sol...
ver más
|
|
|
|
|
|
|
Elias Dritsas, Andreas Kanavos, Maria Trigka, Spyros Sioutas and Athanasios Tsakalidis
The need to store massive volumes of spatio-temporal data has become a difficult task as GPS capabilities and wireless communication technologies have become prevalent to modern mobile devices. As a result, massive trajectory data are produced, incurring...
ver más
|
|
|
|