default search action
16th IMCOM 2022: Seoul, South Korea
- 16th International Conference on Ubiquitous Information Management and Communication, IMCOM 2022, Seoul, Korea, Republic of, January 3-5, 2022. IEEE 2022, ISBN 978-1-6654-2678-7
- Hidemoto Nakada, Hideki Asoh:
A Method to Generate Posed Person Image with few Context Images. 1-6 - Sarerusaenye Ismail, Shahrinaz Ismail:
A Preliminary Study of Cashless Payment Face Recognition System Development in Malaysia. 1-5 - Mohamed Hassan Abdel Hamied:
Smart Home Appliances Control System and Smart Wireless Charger for Electric Vehicles. 1-8 - Yu Rong, Jinglong Jiang, Husna Mutahira, Mannan Saeed Muhammad:
Monocular Intra-vehicular Distance Estimation using Front Vehicle License Plate. 1-6 - Tran Anh Kiet, Nguyen Thi Le Quyen, Phan Hieu Ho, Trung Hung Vo:
A Novel Approach for UAV-Aided Vehicle-to-Everything Networks. 1-4 - Sebastian Robson, Snehasish Banerjee, Avneet Kaur:
Brand Post Popularity on Social Media: A Systematic Literature Review. 1-6 - Minho Kim, Youngsoo Do, Jaewook Jeon:
Wireless ECU reprogramming for multiple vehicles in factories and service centers via WiFi. 1-5 - Ayesha Jehan, Muhammad Zeeshan:
Comparative Performance Analysis of Code-Domain NOMA and Power-Domain NOMA. 1-6 - Abdulrahman Hussien Mustafa, Farah Mahmoud AbdelMoneim, Magy Gamal Matta, Toka Ossama Barghash, Walid Gomaa:
Automatic Forecasting of Volcanoes Eruption Time. 1-8 - Thuong Le-Tien, Tai Nguyen-D.-P, Vy Huynh-Y:
Developing a Chatbot system using Deep Learning based for Universities consultancy. 1-7 - Mahmood Qolizadeh, Mohammad Saniee Abadeh:
Feature Reuse in CNN for Human Proteins Localization. 1-5 - Nguyen Thu Nga, Chu Huu Khanh, Nguyen Quy Tho:
An Investigation of The 5G LDPC and Polar Decoding Performance in Spatial Correlated MIMO-OFDMA System. 1-7 - Hana Munira Muhd Mukhtar, Yasmin Yahya, Azizah Rahmat, Roslan Ismail:
Timber Harvesting Residual Trees Damage Decision-Making for Sustainable Forest Management. 1-5 - Ji-Ho Park, Yijun Piao, Tae-Jin Lee:
RIS-based Energy and Data Transfer Protocol in IoT Networks. 1-4 - Syeda Rabia Arshad, Ishwa Obaid, Rameesha Gull, Muhammad Khuram Shahzad:
Steel Defect Classification Using Machine Learning. 1-6 - Alexey S. Rodionov:
Network Probabilistic Connectivity: Optimal Structures II. 1-6 - Mohammed Adnan Islam, Muhammad Ehsan Rana:
Utilization of Big Data with Cloud Computing in Modern Business Environment: A Review. 1-7 - Wei Chun Lew, Muhammad Ehsan Rana, Vazeerudeen Abdul Hameed:
A Comparative Investigation on the Use of Cloud Computing for Big Data Analytics. 1-8 - Abdul Hanan Minhas, Mohammad Daniyal Shaiq, Saad Ali Qureshi, Musa Dildar Ahmed Cheema, Shujaat Hussain, Kifayat Ullah Khan:
An Efficient Algorithm for Ranking Candidates in E-Recruitment System. 1-8 - Uakomba Mbasuva, Guy-Alain Lusilao-Zodi:
Designing Ensemble Deep Learning Intrusion Detection System for DDoS attacks in Software Defined Networks. 1-8 - Suriana Ismail, M. Aiman M. Hanafi, Roslan Ismail, Ahmad Shahrafidz Khalid, Faridah Sh Ismail:
Geo-Fencing Technique for Internship Placement- Use Cases Deliverables. 1-4 - Dongyan Nan, Min Hyung Park, Woomin Nam, Yerin Kim, ShaoPeng Che, Jang Hyun Kim:
Exploring User Experience of "Animal Crossing" via Semantic Network Approach. 1-4 - Shota Nakamura, Tomoko Kajiyama:
A More Effective Book Search System Utilizing Colors Reflecting Reader Impressions. 1-4 - Yoshihaya Takahashi, Atsuya Sonoyama, Takeshi Kamiyamaton, Masato Oguchi, Saneyasu Yamaguchi:
Person Identification Based on Accelerations on Drawing Figures with a Smartphone. 1-4 - Hoang Ngoc Tran, Ty Trung Nguyen, Ton Hoang Nguyen, Bac Viet Nguyen, Hung Quang Cao, Jae Wook Jeon:
Online-Tuning of Speed and Position Controllers using Particle Swarm Optimization Algorithm for a BLDC Motor. 1-7 - Nafisa Anjum, Pramit Dutta:
Identifying Counterfeit Products using Blockchain Technology in Supply Chain System. 1-5 - Vladimir V. Shakhov, Anastasia N. Yurgenson, Honglong Chen:
On Reliability of Pipeline Monitoring Sensor Networks. 1-3 - Zeeshan Ali, Waqas Nawaz, Kifayat-Ullah Khan:
An Efficient Multi-Criteria Path Selection Approach in Road Networks through Influencer Nodes and K-hop Search. 1-7 - Seungjong Sun, Minwoo Kim, Dongyan Nan, Jang-Hyun Kim:
Relationship between Hashtags Usage and Reach Rate in Instagram. 1-4 - ShaoPeng Che, Pim Kamphuis, Shunan Zhang, Jang-Hyun Kim:
RECP from the Perspective of Chinese Mainlanders and Taiwanese Netizens: A Comparative Semantic Network Analysis. 1-4 - Matthias Baumgart, Claudia Hösel, Manuel Heinzig, Matthias Vodel, Christian Roschke, Marc Ritter:
A Framework for an IT-based risk management for the third-party funding process in universities (TRINITY). 1-8 - Saeed Ur Rehman Bhatti, Mohammad Daniyal Shaiq, Hira Sajid, Saad Ali Qureshi, Shujaat Hussain, Kifayat Ullah Khan:
Resu-mizer: Hybrid Resume Information Retrieval System. 1-7 - Koushik Deb, Hemangee De, Seshadri Sekhar Chatterjee, Anjan Pal:
Studying Borderline Personality Disorder Using Machine Learning. 1-6 - Sergey Kratov, Alexey Podsadnikov:
The Development of the Massive Open Online Course on Distance Forms of Research and Training. 1-7 - Abdulaziz Aborujilah, Abubaker-Eseddig Fathi Mahmoud Elsebaie, Shamsul Anuar Mokhtar, Zalizah Awang Long, Shafiza Mohd Shariff, Nur Syahela Hussien, Mohd Nizam Husen:
A Conceptual Framework for an Integrated Healthcare Information Systems from an Organizational Perspective. 1-8 - Pham Van Nguyen, Duc-Tai Le, Su Jeong Song, Hyunseung Choo:
Towards AI based Ophthalmological Screening through Ultra-widefield Fundus Image to Conventional Fundus Image Translation. 1-3 - Yoga Pristyanto, Anggit Ferdita Nugraha, Akhmad Dahlan, Lucky Adhikrisna Wirasakti, Aditya Ahmad Zein, Irfan Pratama:
Multiclass Imbalanced Handling using ADASYN Oversampling and Stacking Algorithm. 1-5 - Hasibul Huda, Md. Ariful Islam Fahad, Moonmoon Islam, Amit Kumar Das:
Bangla Handwritten Character and Digit Recognition Using Deep Convolutional Neural Network on Augmented Dataset and Its Applications. 1-7 - Asim Abbas, Jamil Hussain, Muhammad Afzal, Hafiz Syed Muhammad Bilal, Sungyoung Lee, Seokhee Jeon:
Explicit and Implicit Section Identification from Clinical Discharge Summaries. 1-8 - Hii Lee Jia, Vazeerudeen Abdul Hameed, Muhammad Ehsan Rana:
CyberSaver - A Machine Learning Approach to Detection of Cyber Bullying. 1-5 - Kenji Matsuura, Hiroki Tanioka, Naka Gotoda, Tomohito Wada:
Self-studying environment with imagery rehearsal for a ball-carrier in basketball. 1-7 - Pildong Hwang, Yanggon Kim:
Data Cleaning of Sound Data with Label Noise Using Self Organizing Map. 1-5 - Thanh Cong Tran, Tran Khanh Dang:
Machine Learning for Multi-Classification of Botnets Attacks. 1-8 - Toyohide Watanabe:
Knowledge Creation in Online Environment: Bridge between Self and Collaborative Studies. 1-8 - Hyunju Kim, Junwon Hwang, Taewoo Yoo, Yun-Gyung Cheong:
Improving a Graph-to-Tree Model for Solving Math Word Problems. 1-7 - Abdulaziz Aborujilah, Jibril Adamu, Shafiza Mohd Shariff, Zalizah Awang Long:
Descriptive Analysis of Built-in Security Features in Web Development Frameworks. 1-8 - Nhat Hoang Bach, Lang Vu Hai, Giang Tran Quang, Due Nguyen Van, Le Ha Vu, Trung Trinh Xuan:
Optimizing baseline in USBL using Costas hopping to increase navigation precision in shallow water. 1-6 - Dat Vuong, Tran The Son, Duong Huu Ai, Trong-Hop Do, C. P. Huynh, Hung N. Tan, N. V. A. Quang, Tttvinh:
A Novel Integrated Model for Positioning Indoor MISO VLC Exploiting Non-Light-of-Sight Communication. 1-5 - Snehasish Banerjee, Ariadne Beatrice Kapetanaki, Lauren Dempsey:
Older People's Online Information Search During the Pandemic. 1-6 - Sarah Kiyani, Musa Dildar Ahmed Cheema, Saad Ali Qureshi, Shujaat Hussain, Kifayat Ullah Khan:
Feature-Wise Ranking of Candidates through Maximum Degrees in Hidden Bipartite Graphs. 1-8 - Muhammad Fasih Ashfaq, Maryam Malik, Urooj Fatima, Muhammad Khuram Shahzad:
Classification of IoT based DDoS Attack using Machine Learning Techniques. 1-6 - Nguyen Le Hoang, Tran Khanh Dang:
Alpha Lightweight Coreset for k-Means Clustering. 1-8 - Ubaid Ur Rehman, Amir Ali, Hafiz Syed Muhammad Bilal, Muhammad Asif Razzaq, Seong-Bae Park, Sungyoung Lee:
A Novel Mutual Trust Evaluation Method for Identification of Trusted Devices in Smart Environment. 1-4 - Taketoshi Ushiama, Tenyu Kawaguchi:
Estimating Neutrality of News Articles and Reactions on Twitter. 1-8 - Yuh-Yih Lu, Feng-Cheng Chang, Hsiang-Cheh Huang, Po-Liang Chen:
Comparisons of Reconstruction Capabilities for Lossy Transmission with Block-Based Compressed Sensing. 1-4 - Huu-Hung Nguyen, The-Tien Nguyen, Xuan-Phuc Nguyen, Cong-Manh Tran, Quang-Thi Nguyen:
Multiple Frame Integration for Essential Matrix-based Visual Odometry. 1-6 - Amin Ahmadi Kasani, Hedieh Sajedi:
Predict joint angle of body parts based on sequence pattern recognition. 1-5 - Hira Sajid, Javeria Kanwal, Saeed Ur Rehman Bhatti, Saad Ali Qureshi, Amna Basharat, Shujaat Hussain, Kifayat Ullah Khan:
Resume Parsing Framework for E-recruitment. 1-8 - Young Soo Do, Min Ho Kim, Jae Wook Jeon:
Implementation and Performance Analysis of Time-Determined Forwarding and Queuing Functions Based on IEEE 802.1Qav. 1-6 - Tien Pham Van, Chung Duc Nguyen Dang:
Urgency-differentiated Data Acquisition in Large UAV-integrated IoT Systems. 1-6 - Mingue Song, Yanggon Kim:
Deep Representation for the Classification of Ultrasound Breast Tumors. 1-6 - Ton Hoang Nguyen, Ty Trung Nguyen, Hoang Ngoc Tran, Jae Wook Jeon:
An Improved Sliding Mode Control Using Reduced-order PI Observer for PMSM system. 1-5 - Paaras Chand, Melody Moh, Teng-Sheng Moh:
An Approach to Improving Anomaly Detection Using Multiple Detectors. 1-8 - Dejun Kong, Xiaofeng Gao, Guihai Chen:
Collection Tree for Wireless Coverage Problem in Mobile Crowdsensing. 1-7 - Rakesh Gururaj, Melody Moh, Teng-Sheng Moh, Philip Shilane, Bhimsen Bhanjois:
Performance Centric Primary Storage Deduplication Systems Exploiting Caching and Block Similarity. 1-8 - Mohammad Fahim Arefin, Chowdhury Farhan Ahmed, Redwan Ahmed Rizvee, Carson K. Leung, Longbing Cao:
Mining Contextual Item Similarity without Concept Hierarchy. 1-8 - Hibbah Nadeem, Rukhma Tassadaq, Mobeen Nazar, Ahsan Mustufa:
Probec: A Product hunting tool. 1-7 - Changhoon Song, Sukhan Lee:
Accurate Non-Contact Body Temperature Measurement with Thermal Camera under Varying Environment Conditions. 1-6 - Yuanyuan Wang:
Hotel Recommendation based on Review Analysis by Considering Tourism Needs. 1-8 - Jihyeon Ryu, Dongho Won, Youngsook Lee:
A Study of Split Learning Model. 1-4 - Tran Anh Kiet, Tuan Cao Xuan, Phan Hieu Ho, Nguyen Thi Le Quyen, Phuong Hoai Dang, Vo Trung Hung:
Power Minimization for Data Collection in UAV-Assisted IoT Wireless Sensor Networks. 1-3 - Maslinda Mohd Nadzir, Baktajivan Pillay:
A mobile game approach for energy conservation awareness. 1-4 - Nhan Trinh, Duc M. Duong, Binh Tran, Hoai Su:
Hybrid Neural Networks for Electroencephalography Motor Imaging Classification. 1-6 - Tianxiang Hu, Jiyi Li, Fumiyo Fukumoto, Renjie Zhou:
A Multi-task based Bilateral-Branch Network for Imbalanced Citation Intent Classification. 1-8 - Amir Aslan Aslani, Mohammad Zolfaghari, Hedieh Sajedi:
Automatic Counting Red Blood Cells in the Microscopic Images by EndPoints Method and Circular Hough Transform. 1-5 - Ishrat Jahan Yra, Maksud Hossain Pranto, Amit Kumar Das:
HELLO: An Android-based Mobile Application for Autism Individuals to Improve Socio-Communicational Learnability in Bangladesh. 1-7 - Younghoon Jang, Syed M. Raza, Hyunseung Choo, Moonseong Kim:
UAVs Handover Decision using Deep Reinforcement Learning. 1-4 - Niloofar Jazayeri, Farnaz Jazayeri, Hedieh Sajedi:
Medical Image Segmentation for Skin Lesion Detection via Topological Data Analysis. 1-8 - B. Fatokun Faith, Zalizah Awang Long, Suraya Hamid, O. Fatokun Johnson, Christopher Ifeanyi Eke, Azah Anir Norman:
An Intelligent Gamification Tool to Boost Young Kids Cybersecurity Knowledge on FB Messenger. 1-8 - Tien Pham Van, Chung Duc Nguyen Dang:
Underwater Searching based on AUV - ASV Cooperation. 1-7 - Fahad Ahmed Satti, Musarrat Hussain, Sungyoung Lee, TaeChoong Chung:
Significance of Syntactic Type Identification in Embedding Vector based Schema Matching. 1-6 - Qingqing Chen, Dingsheng Wan, Yufeng Yu, Ke Li:
Intelligent Water Level Prediction Model for small-and medium-sized rivers Based on Small Sample Data. 1-7 - Thien-Binh Dang, Duc-Tai Le, Moonseong Kim, Hyunseung Choo:
A General Model for Long-short Term Anomaly Generation in Sensory Data. 1-5 - Pranathi Padidem, Ahyoung Lee:
Studying Offloading Optimization for Energy-Latency Tradeoff with Collaborative Edge Computing. 1-6 - Mazen Khodier, Ahmed Abdelaziz, Maria Gadelkarim, Abdelrahman Abdelkhalek, Walid Gomaa:
Sorting of Scrambled Video Frames Using Temporal Order Verification. 1-8 - Omar Alaaeldein, Omar Sayed El Ahl, Lamiaa Elmahy, Martin Ihab, Walid Gomaa:
Analysis of COVID-19 Using Imaging and Audio Modalities. 1-10 - Joshua F. Smallwood, Chenru Zhao, Carson K. Leung, Yan Wen, Hao Zheng:
Mining the Impacts of COVID-19 Pandemic on the Labour Market. 1-8 - Justyna Zywiolek, Achyuth Sarkar, Muhammad Safdar Sial:
Biometrics as a method of employee control. 1-5 - Paulino Cristovao, Hidemoto Nakada, Yusuke Tanimura, Hideki Asoh:
Few Shot Model based on Weight Imprinting with Multiple Projection Head. 1-7 - Kamalanathan Shanmugam, Muhammad Ehsan Rana, Grace Ong:
IoT based Indoor Senior Citizen Monitoring and Alerting System. 1-4 - Seho Bae, Nizam Ud Din, Hyunkyu Park, Juneho Yi:
Face Photo-Sketch Recognition Using Bidirectional Collaborative Synthesis Network. 1-8 - Ha Thi The Nguyen, Ling-Hsiu Chen, Vani Suthamathi Saravanarajan:
Using Feed-forward Backprop, Perceptron, and Self-organizing Algorithms to Predict Students' Online Behavior. 1-5 - YuJia Han, Miyuki Nakano, Masato Oguchi:
Music recommendation service based on user impressions: Study of user interface acquiring appropriate impression words. 1-8 - Jiyoung Yoon, Muhammad Junaid, Sajid Ali, Jongwuk Lee:
Abstractive Summarization of Korean Legal Cases using Pre-trained Language Models. 1-7 - Ahmed Fayez, Ahmed Sharshar, Ahmed Hesham, Islam Eldifrawi, Walid Gomaa:
ValS: A Leading Visual and Inertial Dataset of Squats. 1-8 - Ritu Chauhan, Aparajita Sengupta, Eiad Yafi:
Artificial Intelligence an Influential Review: Pandemic Scenario. 1-7 - Waseem Abbas, Munkyo Seo:
A gain boosted single stage wideband InP HBT amplifier for terahertz applications. 1-4 - Gatha Varma, Ritu Chauhan:
Cybercriminals Strike Where It Hurts Most: SARS-Cov-2 Pandemic and its Influence on Critical Infrastructure Ransomware Attacks. 1-7 - Ju-Chan Kim, Duc-Tai Le, Su Jeong Song, Chang-Hwan Son, Hyunseung Choo:
Multi-modal Fundus Image Registration with Deep Feature Matching and Image Scaling. 1-3 - Jung Rok Kim, Jae Wook Jeon:
Real-time Scale and Rotation Invariant Multiple Template Matching. 1-5 - Huaze Xie, Da Li, Yuanyuan Wang, Yukiko Kawai:
Analysis and Forecast of the COVID-19 Spreading Curve for the Resumption of In-person Classes. 1-4 - Dongwoo Kang, Hoil Ryu, Dongho Won:
Implementation on Partially Verifiable Multi-signature Scheme in Electronic Contract Systems. 1-4 - Rudi Susanto, Mohd Nizam Husen, Adidah Lajis:
The Product Development of Portable Laboratory Integrated with Local Wisdom (PL-ILW) by Undergraduate Student. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.