{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:54:58Z","timestamp":1743101698989,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031281235"},{"type":"electronic","value":"9783031281242"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28124-2_1","type":"book-chapter","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:20:17Z","timestamp":1680171617000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and\u00a0Implementation of\u00a0Deep Learning Real-Time Streaming Video Data Processing System"],"prefix":"10.1007","author":[{"given":"Qiming","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Jing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Linhao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fengling","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"issue":"4s","key":"1_CR1","first-page":"1","volume":"12","author":"Y Li","year":"2016","unstructured":"Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimed. Comp. Comm. App. 12(4s), 1\u201318 (2016)","journal-title":"ACM Trans. Multimed. Comp. Comm. App."},{"issue":"2","key":"1_CR2","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/JSYST.2014.2345733","volume":"11","author":"M Qiu","year":"2014","unstructured":"Qiu, M., Chen, Z., Ming, Z., Qin, X., Niu, J.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813\u2013822 (2014)","journal-title":"IEEE Syst. J."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Qiu, M., Li, H., Sha, E.: Heterogeneous real-time embedded software optimization considering hardware platform. ACM Sym. Appl. Comp. 1637\u20131641 (2009)","DOI":"10.1145\/1529282.1529651"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Qiu, M., Xue, C., Shao, Z., Sha, E.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE Conference, pp. 1\u20136 (2007)","DOI":"10.1109\/DATE.2007.364537"},{"issue":"12","key":"1_CR5","first-page":"1565","volume":"72","author":"J Niu","year":"2012","unstructured":"Niu, J., Gao, Y., et al.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC 72(12), 1565\u20131575 (2012)","journal-title":"JPDC"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Qiu, M., Xue, C., Shao, Z., et al.: Efficient algorithm of energy minimization for heterogeneous wireless sensor network. In: IEEE EUC, pp. 25\u201334 (2006)","DOI":"10.1007\/11802167_5"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigData Security (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"issue":"13","key":"1_CR8","first-page":"10327","volume":"8","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Dong, T., Zhang, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE IoT J. 8(13), 10327\u201310335 (2020)","journal-title":"IEEE IoT J."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Qiu, M., Qiu, H.: Review on image processing based adversarial example defenses in computer vision. In: IEEE Conference on BigData Security, pp. 94\u201399, Baltimore, MD, USA (2020)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00027"},{"issue":"1","key":"1_CR10","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell, A., White, T., Dumoulin, V., Arulkumaran, K., Sengupta, B., Bharath, A.A.: Generative adversarial networks: an overview. IEEE Signal Proc. Mag. 35(1), 53\u201365 (2018)","journal-title":"IEEE Signal Proc. Mag."},{"issue":"9","key":"1_CR11","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.sysarc.2011.03.005","volume":"57","author":"J Li","year":"2011","unstructured":"Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Arch. 57(9), 840\u2013849 (2011)","journal-title":"J. Syst. Arch."},{"key":"1_CR12","first-page":"55","volume":"46","author":"M Qiu","year":"2007","unstructured":"Qiu, M., Jia, Z., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. J. Signal Proc. Sys. 46, 55\u201373 (2007)","journal-title":"J. Signal Proc. Sys."},{"issue":"3","key":"1_CR13","first-page":"501","volume":"18","author":"M Qiu","year":"2009","unstructured":"Qiu, M., Yang, L., Shao, Z., Sha, E.: Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE TVLSI 18(3), 501\u2013504 (2009)","journal-title":"IEEE TVLSI"},{"issue":"5","key":"1_CR14","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1080\/17445760.2019.1585848","volume":"35","author":"N Tantalaki","year":"2020","unstructured":"Tantalaki, N., Souravlas, S., Roumeliotis, M.: A review on big data real-time stream processing and its scheduling techniques. Int. J. Parallel Emerg. Distrib. Syst. 35(5), 571\u2013601 (2020)","journal-title":"Int. J. Parallel Emerg. Distrib. Syst."},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1007\/s00607-018-0614-9","volume":"101","author":"S Memeti","year":"2019","unstructured":"Memeti, S., Pllana, S., Binotto, A., et al.: Using meta-heuristics and machine learning for software optimization of parallel computing systems: a systematic literature review. Computing 101, 893\u2013936 (2019)","journal-title":"Computing"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"154300","DOI":"10.1109\/ACCESS.2019.2946884","volume":"7","author":"H Isah","year":"2019","unstructured":"Isah, H., Abughofa, T., Mahfuz, S., et al.: A survey of distributed data stream processing frameworks. IEEE Access 7, 154300\u2013154316 (2019)","journal-title":"IEEE Access"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Calavaro, C., Russo, G.R., Cardellini, V.: Real-time analysis of market data leveraging Apache Flink. In: 16th ACM International Conference on Distributed and Event-Based Systems (DEBS), New York, NY, USA, pp. 162\u2013165 (2022)","DOI":"10.1145\/3524860.3539650"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Xu, B., Jiang, J., Ye, J.: Information intelligence system solution based on Big Data Flink technology. In: 2022 ACM 4th International Conference on Big Data Engineering (BDE), New York, NY, USA, pp. 21\u201326 (2022)","DOI":"10.1145\/3538950.3538954"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"HoseinyFarahabady, M.R., Jannesari, A., et al.: Q-Flink: A QoS-Aware Controller for Apache Flink. In: 20th IEEE\/ACM Symposium on Cluster, Cloud and Internet Computing (CCGRID), pp. 629\u2013638 (2020)","DOI":"10.1109\/CCGrid49817.2020.00-30"},{"key":"1_CR20","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-030-92231-3_4","volume-title":"ICWE 2021 Workshops","author":"TW Ha","year":"2022","unstructured":"Ha, T.W., Kang, J.M., Kim, M.H.: Real-time deep learning-based anomaly detection approach for\u00a0multivariate data streams with\u00a0Apache Flink. In: Bakaev, M., Ko, I.-Y., Mrissa, M., Pautasso, C., Srivastava, A. (eds.) ICWE 2021. CCIS, vol. 1508, pp. 39\u201349. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-92231-3_4"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Dong, Y., Wang, R., He, J.: Real-time network intrusion detection system based on deep learning. In: IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), pp. 1\u20134 (2019)","DOI":"10.1109\/ICSESS47205.2019.9040718"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Del Monte, B., Prodan, R.: A scalable GPU-enabled framework for training deep neural networks. In: 2nd International Conference on Green High Performance Computing (ICGHPC), pp. 1\u20138 (2016)","DOI":"10.1109\/ICGHPC.2016.7508071"},{"issue":"4","key":"1_CR23","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1109\/TITB.2009.2023116","volume":"13","author":"F Hu","year":"2009","unstructured":"Hu, F., Lakdawala, S., et al.: Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE Trans Inf. Tech. Biomed. 13(4), 656\u2013663 (2009)","journal-title":"IEEE Trans Inf. Tech. Biomed."},{"issue":"7","key":"1_CR24","doi-asserted-by":"publisher","first-page":"4560","DOI":"10.1109\/TITS.2020.3032882","volume":"22","author":"H Qiu","year":"2021","unstructured":"Qiu, H., Zheng, Q., et al.: Topological graph convolutional network-based urban traffic flow and density prediction. IEEE Trans. Intel. Trans. Sys. 22(7), 4560\u20134569 (2021)","journal-title":"IEEE Trans. Intel. Trans. Sys."},{"issue":"4","key":"1_CR25","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1109\/TII.2020.3008010","volume":"17","author":"Y Li","year":"2021","unstructured":"Li, Y., Song, Y., et al.: Intelligent fault diagnosis by fusing domain adversarial training and maximum mean discrepancy via ensemble learning. IEEE Trans. Indus. Inform. 17(4), 2833\u20132841 (2021)","journal-title":"IEEE Trans. Indus. Inform."}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28124-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:36:08Z","timestamp":1680172568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28124-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031281235","9783031281242"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28124-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"312","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}