{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:37:12Z","timestamp":1743043032306,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813343696"},{"type":"electronic","value":"9789813343702"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-33-4370-2_13","type":"book-chapter","created":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:29:33Z","timestamp":1605745773000},"page":"178-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Uberwasted App for Reporting and Collecting Waste Using Location Based and Deep Learning Technologies"],"prefix":"10.1007","author":[{"given":"Binh Thanh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Dat Ho","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Hien Vo Thi","family":"Dieu","sequence":"additional","affiliation":[]},{"given":"Dat Nguyen","family":"Khac","sequence":"additional","affiliation":[]},{"given":"Huy Truong","family":"Dinh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,19]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","unstructured":"Barzilay, M.: Data collection and mobile technologies (2019). https:\/\/doi.org\/10.13140\/rg.2.2.31541.93929","DOI":"10.13140\/rg.2.2.31541.93929"},{"key":"13_CR2","unstructured":"Berg Insight: Mobile Location-Based Services (2012). http:\/\/www.berginsight.com\/ReportPDF\/ProductSheet\/bi-lbs4-ps.pdf"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"2199","DOI":"10.1001\/jama.2017.14585","volume":"318","author":"BE Bejnordi","year":"2017","unstructured":"Bejnordi, B.E., et al.: Diagnostic assessment of deep learning algorithms for detection of lymph node metastases in women with breast cancer. JAMA 318, 2199\u20132210 (2017)","journal-title":"JAMA"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1038\/nature21056","volume":"542","author":"A Esteva","year":"2017","unstructured":"Esteva, A., Kuprel, B., Novoa, R.A., et al.: Dermatologist-level classification of skin cancer with deep neural networks. Nature 542, 115\u2013118 (2017)","journal-title":"Nature"},{"issue":"5","key":"13_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIC.2012.70","volume":"16","author":"G Chatzimilioudis","year":"2012","unstructured":"Chatzimilioudis, G., Konstantinidis, A., Laoudias, C., Zeinalipour-Yazti, D.: Crowdsourcing with Smartphones. IEEE Internet Comput. 16(5), 36\u201344 (2012)","journal-title":"IEEE Internet Comput."},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"2402","DOI":"10.1001\/jama.2016.17216","volume":"316","author":"V Gulshan","year":"2016","unstructured":"Gulshan, V., Peng, L., Coram, M., et al.: Development and validation of a deep learning algorithm for detection of diabetic retinopathy in retinal fundus photographs. JAMA 316, 2402\u20132410 (2016)","journal-title":"JAMA"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-34707-8_2","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"DTA Hoang","year":"2012","unstructured":"Hoang, D.T.A., Ngo, N.S., Nguyen, B.T.: Collective cubing platform towards definition and analysis of warehouse cubes. In: Nguyen, N.-T., Hoang, K., Je\u0327drzejowicz, P. (eds.) ICCCI 2012. LNCS (LNAI), vol. 7654, pp. 11\u201320. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34707-8_2"},{"key":"13_CR8","unstructured":"Brownlee, J.: A Gentle Introduction to Pooling Layers for Convolutional Neural Networks. https:\/\/machinelearningmastery.com\/pooling-layers-for-convolutional-neural-networks\/"},{"key":"13_CR9","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems 25 (2012). https:\/\/papers.nips.cc\/paper\/4824-imagenet-classification-with-deep-convolutional-neuralnetworks.pdf. Accessed 22 Jan 2018"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Nguyen, T.B., Ngo, N.S.: Semantic cubing platform enabling interoperability analysis among cloud-based linked data cubes. In: Proceedings of the 8th International Conference on Research and Pratical Issues of Enterprise Information Systems, CONFENIS 2014, 2014, ACM International Conference Proceedings Series (2014)","DOI":"10.1145\/2684200.2684361"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Nguyen, T.B., Wagner, F., Schoepp, W.: GAINS-BI: business intelligent approach for greenhouse gas and air pollution interactions and synergies information system. In: Proceedings of the International Organization for Information Integration and Web-Based Application and Services IIWAS 2008, Linz (2008)","DOI":"10.1145\/1497308.1497369"},{"key":"13_CR12","doi-asserted-by":"publisher","unstructured":"Nguyen, T.B., Wagner, F., Schoepp, W.: Federated data warehousing application framework and platform-as-a-services to model virtual data marts in the clouds. Int. J. Intell. Inf. Database Syst. 8(3), 280 (2014). ISSN 1751-5858, 1751-5866. https:\/\/doi.org\/10.1504\/ijiids.2014.066635","DOI":"10.1504\/ijiids.2014.066635"},{"key":"13_CR13","unstructured":"Kumar, N.: Batch Normalization and Dropout in Neural Networks with Pytorch. https:\/\/towardsdatascience.com\/batch-normalization-and-dropout-in-neural-networks-explained-with-pytorch-47d7a8459bcd"},{"key":"13_CR14","unstructured":"Ruiz, P.: Understanding and visualizing ResNets. https:\/\/towardsdatascience.com\/understanding-and-visualizing-resnets-442284831be8"},{"key":"13_CR15","unstructured":"Skalski, P.: Gentle Dive into Math Behind Convolutional Neural Networks. https:\/\/towardsdatascience.com\/gentle-dive-into-math-behind-convolutional-neural-networks-79a07dd44cf9"},{"issue":"3","key":"13_CR16","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vision 115(3), 211\u2013252 (2015). https:\/\/doi.org\/10.1007\/s11263-015-0816-y","journal-title":"Int. J. Comput. Vision"},{"key":"13_CR17","unstructured":"Using mobile phones in data collection: Opportunities, issues and Challenges. http:\/\/blogs.worldbank.org\/edutech\/using-mobile-phones-data-collection-opportunities-issues-and-challenges. Accessed Sept 2018"},{"issue":"4","key":"13_CR18","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s13244-018-0639-9","volume":"9","author":"R Yamashita","year":"2018","unstructured":"Yamashita, R., Nishio, M., Do, R.K.G., Togashi, K.: Convolutional neural networks: an overview and application in radiology. Insights Imaging 9(4), 611\u2013629 (2018). https:\/\/doi.org\/10.1007\/s13244-018-0639-9","journal-title":"Insights Imaging"},{"key":"13_CR19","unstructured":"Yun, H., Han, D., Lee, C.C.: Understanding the use of location-based service applications: do privacy concerns matter? J. Electron. Commer. Res. (2013)"},{"key":"13_CR20","unstructured":"Szab\u00f3, Z., Bilicki, V., Berta, \u00c1., J\u00e1nki, Z.R.: Smartphone-based data collection with stunner using crowdsourcing: lessons learnt while cleaning the data. In: Twelfth International Multi-Conference on Computing in the Global Information Technology (2017)"},{"key":"13_CR21","unstructured":"Agarap, A.F.M.: Deep Learning using Rectified Linear Units (ReLU). https:\/\/arxiv.org\/pdf\/1803.08375.pdf"},{"key":"13_CR22","unstructured":"Kostadinov, S.: Understanding Backpropagation Algorithm. https:\/\/towardsdatascience.com\/understanding-backpropagation-algorithm-7bb3aa2f95fd"},{"key":"13_CR23","unstructured":"Understand Cross Entropy Loss in Minutes. https:\/\/medium.com\/data-science-bootcamp\/understand-cross-entropy-loss-in-minutes-9fb263caee9a"},{"key":"13_CR24","unstructured":"Fully Connected Layers in Convolutional Neural Networks: The Complete Guide. https:\/\/missinglink.ai\/guides\/convolutional-neural-networks\/fully-connectedlayers-convolutional-neural-networks-complete-guide\/"},{"key":"13_CR25","unstructured":"SuperDataScience Team. Convolutional Neural Networks (CNN): Step 3 \u2013 Flattening. https:\/\/www.superdatascience.com\/blogs\/convolutional-neural-networks-cnn-step-3-flattening"},{"key":"13_CR26","unstructured":"Fused Location Provider API https:\/\/developers.google.com\/location-context\/fused-location-provider"},{"key":"13_CR27","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: A Simple Way to Prevent Neural Networks from Overfitting. http:\/\/jmlr.org\/papers\/v15\/srivastava14a"}],"container-title":["Communications in Computer and Information Science","Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4370-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T00:56:16Z","timestamp":1619312176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-33-4370-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813343696","9789813343702"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4370-2_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quy Nhon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.thefdse.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"161","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.5 avg. reviewers\/paper (for two submission rounds in total). LNCS 12466 includes 24 of the accepted papers and 2 invited keynotes. CCIS 1306 includes 29 full and 8 short of the accepted papers. The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}