1

Process-aware Human Activity Recognition

Humans naturally follow distinct patterns when conducting their daily activities, which are driven by established practices and processes, such as production workflows, social norms and daily routines. Human activity recognition (HAR) algorithms …

Alignment-based conformance checking over probabilistic events

Conformance checking techniques allow us to evaluate how well some exhibited behaviour, represented by a trace of monitored events, conforms to a specified process model. Modern monitoring and activity recognition technologies, such as those relying …

Predictive Behavioural Monitoring and Deviation Detection in Activities of Daily Living of Older Adults

Predictive behaviour monitoring of Activities of Daily Living (ADLs) can provide unique, personalised insights about an older person’s physical and cognitive health and lead to unique opportunities to support self-management, proactive intervention …

BC-RAN: Cloud radio access network enabled by blockchain for 5G

Cloud radio access network (C-RAN) supports the explosion of Internet of Things (IoT) applications and the demand for massive access in 5G networks. However, centralized access of trustless operators causes severe malicious insider threats, such as …

QoS-Aware Path Finding and Load Balancing in Service-Composition

Service-composition is an effective way to satisfy users' complex and multi-functional requirements in the current cloud environment. Aiming at the problem that the current large-scale service-composition is inefficient and service system is instable …

An Abnormal Transaction Detection Mechanim on Bitcoin

In recent years, illegal activities such as money laundering using cryptocurrency represented by bitcoin have been emerging. The anonymity, two-way convertibility and transnational of bitcoin are used to "launder" illegal income. Some bitcoin theft …

Trust-PBFT: a PeerTrust-based Practical Byzantine Consensus Algorithm

Blockchain-based secure digital asset exchange scheme with QoS-aware incentive mechanism

As the Internet of things (IoT) is increasingly popular, the number of IoT devices such as sensors and smart equipments are growing at an astonishing rate and data generated by these devices is exploding. However, these massive IoT data, stored in …

MicrothingsChain: Edge Computing and Decentralized IoT Architecture Based on Blockchain for Cross-Domain Data Sharing

With the continuous development of the Internet of Things (IoT), the surge in data generated by sensors and smart devices has caused data overload in designated centralized data centers. However, centralized data centers, such as cloud storage, …