Humans naturally follow distinct patterns when conducting their daily activities, which are driven by established practices and processes, such as production workflows, social norms and daily routines. Human activity recognition (HAR) algorithms …
Conformance checking techniques allow us to evaluate how well some exhibited behaviour, represented by a trace of monitored events, conforms to a specified process model. Modern monitoring and activity recognition technologies, such as those relying …
Predictive behaviour monitoring of Activities of Daily Living (ADLs) can provide unique, personalised insights about an older person’s physical and cognitive health and lead to unique opportunities to support self-management, proactive intervention …
Cloud radio access network (C-RAN) supports the explosion of Internet of Things (IoT) applications and the demand for massive access in 5G networks. However, centralized access of trustless operators causes severe malicious insider threats, such as …
Service-composition is an effective way to satisfy users' complex and multi-functional requirements in the current cloud environment. Aiming at the problem that the current large-scale service-composition is inefficient and service system is instable …
In recent years, illegal activities such as money laundering using cryptocurrency represented by bitcoin have been emerging. The anonymity, two-way convertibility and transnational of bitcoin are used to "launder" illegal income. Some bitcoin theft …
As the Internet of things (IoT) is increasingly popular, the number of IoT devices such as sensors and smart equipments are growing at an astonishing rate and data generated by these devices is exploding. However, these massive IoT data, stored in …
With the continuous development of the Internet of Things (IoT), the surge in data generated by sensors and smart devices has caused data overload in designated centralized data centers. However, centralized data centers, such as cloud storage, …