


default search action
AIIoT 2022: Seattle, WA, USA
- 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 6-9, 2022. IEEE 2022, ISBN 978-1-6654-8453-4

- Aushtmi Deb, Mst. Sadia Akter Koli, Sheikh Beauty Akter, Adil Ahmed Chowdhury

:
An Outcome Based Analysis on Heart Disease Prediction using Machine Learning Algorithms and Data Mining Approaches. 1-7 - Maryam Ghanbari, Witold Kinsner, Nariman Sepehri:

Detection of Faults in Electro-Hydrostatic Actuators Using Feature Extraction Methods and an Artificial Neural Network. 1-7 - Christopher Le, Alvaro Martin Grande, A. J. Carmine, Jordan Thompson, Tauheed Khan Mohd

:
Analysis of Various Vulnerabilities in the Raspbian Operating System and Solutions. 1-6 - Carlos José Martínez

, Sebastià Galmés
:
Analysis of the primary attacks on IoMT Internet of Medical Things communications protocols. 1-7 - Mohammed Faisal Naji, Chibli Joumaa, Yousef Alswailem, Abdulrahman Alobthni, Rayan Albusilan:

Machine Learning-based System for Monitoring Social Distancing and Mask Wearing. 1-8 - Chanuka Bandara, Ashan Dhanuka Sandanayake, Yehan Kodithuwakku, V. Logeeshan

:
Automated Medicinal-Pill Dispenser with Cellular and Wi-Fi IoT Integration. 1-7 - Maame Araba Vander-Pallen, Paul Addai, Stuart Isteefanos, Tauheed Khan Mohd

:
Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 onwards. 1-7 - Brandon Wood, Khaled Slhoub:

Detecting Amazon Bot Reviewers Using Unsupervised and Supervised Learning. 1-8 - Xinchen Xie, Chen Li, Lihua Tian:

Feature Fusion Network Based on Hybrid Attention for Semantic Segmentation. 9-14 - Wael Khallouli, Raphael Pamie-George, Samuel F. Kovacic, Andres Sousa-Poza, Mustafa Canan, Jiang Li:

Leveraging Transfer Learning and GAN Models for OCR from Engineering Documents. 15-21 - Tyler Groom, Kiran George:

Real Time FPGA-Based CNN Training and Recognition of Signals. 22-26 - Tanya Bhardwaj, Paridhi Gupta, Akshita Goyal, Akanksha Nagpal, Vivekanand Jha

:
A Review on Suicidal Ideation Detection Based on Machine Learning and Deep Learning Techniques. 27-31 - Syed Khurram Mahmud

, Yue Chen, Kok Keong Chai:
Ensemble Reinforcement Learning Framework for Sum Rate Optimization in NOMA-UAV Network. 32-38 - Renato R. Maaliw

, Karen Anne C. Quing, Julie Ann B. Susa, Jed Frank S. Maraueses, Ace C. Lagman
, Rossana T. Adao, Ma. Corazon Fernando Raguro, Ranie Baul Canlas
:
Clustering and Classification Models For Student's Grit Detection in E-Learning. 39-45 - Raghubir Singh, József Kovács

, Tamás Kiss
:
To Offload or Not? An Analysis of Big Data Offloading Strategies from Edge to Cloud. 46-52 - Nandang Sunandar, Achmad Nizar Hidayanto:

Data Quality Management Improvement: Case Studi PT BPI. 53-58 - Lucero Sovero Rivera, Nicole Ninamango Origuela, Grimaldo Quispe Santivañez

:
Analysis of the Financial Efficiency of Companies in the Industrial Sector during COVID-19: Case Study in Peru. 59-64 - Kevin Matthe Caramancion

:
Using Timer Data to Conjunct Self-Reported Measures in Quantifying Deception. 65-70 - Nur Uddin, Hendi Hermawan, Nur Layli Rachmawati, Hendy Tannady:

Genetic Algorithm for Logistics-Route Optimization in Urban Area. 71-76 - Shereen Ismail

, Diana Dawoud, Hassan Reza:
Towards A Lightweight Identity Management and Secure Authentication for IoT Using Blockchain. 77-83 - Bhargavi Krishnamurthy, Sajjan G. Shiva, Saikat Das:

MVE-based Reinforcement Learning Framework with Explainability for improving Quality of Experience of Application Placement in Fog Computing. 84-90 - Saroj Mishra, Hassan Reza:

A Face Recognition Method Using Deep Learning to Identify Mask and Unmask Objects. 91-99 - Bhargavi Krishnamurthy, Sajjan G. Shiva:

Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach. 100-105 - Sayan Shaw, Keaton Chia, Jan Kleissl:

Neighbor-Based Optimized Logistic Regression Machine Learning Model For Electric Vehicle Occupancy Detection. 106-110 - Renato R. Maaliw

, Julie Ann B. Susa, Alvin Sarraga Alon, Ace C. Lagman
, Shaneth C. Ambat, Manuel Bautista Garcia, Keno Cruz Piad, Ma. Corazon Fernando Raguro:
A Deep Learning Approach for Automatic Scoliosis Cobb Angle Identification. 111-117 - Paul Addai, Tauheed Khan Mohd:

Power and Telecommunication Lines Detection and Avoidance for Drones. 118-123 - Opeoluwa Tosin Eluwole

, Segun Akande, Oluwole Abiodun Adegbola:
Major threats to the continued adoption of Artificial Intelligence in today's hyperconnected world. 124-130 - Sultan Ahmed Almalki, Ahmed Abdel-Rahim, Frederick T. Sheldon:

Disrupting the Cooperative Nature of Intelligent Transportation Systems. 131-137 - Jordan Johnston, Kaiman Zeng, Nansong Wu:

An Evaluation and Embedded Hardware Implementation of YOLO for Real-Time Wildfire Detection. 138-144 - Muthana Zouri, Alexander Ferworn:

An Approach for Automatic Discovery of Rules Based on ECG Data Using Learning Classifier Systems. 145-154 - Hebah Alquran

, Shadi Banitaan:
Fake News Detection in Social Networks Using Data Mining Techniques. 155-160 - Sanskar Raj Marahata, Eman Abdelfattah, Sandra Ibrahim, Audrina Dobrevic:

No-Clear for Nuclear. 161-166 - Ismail A. Idowu, Kofi Nyarko, Otily Toutsop:

Computer Vision Method in Means of Egress Obstruction Detection. 167-173 - Kanchan Singh, Sakshi S. Grover, Ranjini Kishen Kumar:

Cyber Security Vulnerability Detection Using Natural Language Processing. 174-178 - Kaushallya Adhikari:

Shift-Invariant Structure-Imposed Convolutional Neural Networks for Direction of Arrival Estimation. 179-186 - Muntasir Mamun, Afia Farjana, Miraz Al Mamun, Md Salim Ahammed

:
Lung cancer prediction model using ensemble learning techniques and a systematic review analysis. 187-193 - Muntasir Mamun, Afia Farjana, Miraz Al Mamun, Md Salim Ahammed

, Md Minhazur Rahman:
Heart failure survival prediction using machine learning algorithm: am I safe from heart failure? 194-200 - Hamid Nasiri

, Ghazal Kheyroddin, Morteza Dorrigiv, Mona Esmaeili
, Amir Raeisi Nafchi, Mohsen Haji Ghorbani, Payman Zarkesh-Ha:
Classification of COVID-19 in Chest X-ray Images Using Fusion of Deep Features and LightGBM. 201-206 - Mohammad Shahab Uddin

, Raphael Pamie-George, Daron Wilkins, Andres Sousa-Poza, Mustafa Canan, Samuel F. Kovacic, Jiang Li:
Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks. 207-212 - Mohammad Affan Khalil, Maria Ramirez, Johnny Can, Kiran George:

Implementation of Machine Learning in BCI Based Lie Detection. 213-217 - Mina Esmail Zadeh Nojoo Kambar

, Armin Esmaeilzadeh, Maryam Heidari:
A Survey on Deep Learning Techniques for Joint Named Entities and Relation Extraction. 218-224 - Argeen Blanco, Lance Victor Del Rosario, Ken Ichiro Jose, Melchizedek Alipio

:
Deep Learning Models for Water Potability Classification in Rural Areas in the Philippines. 225-231 - Md Rakibul Ahasan

, Mirza Sanita Haque, Mohammad Rubbyat Akram, Mohammed Fahim Momen, Md. Golam Rabiul Alam:
Deep Learning Autoencoder based Anomaly Detection Model on 4G Network Performance Data. 232-237 - Md. Milon Uddin

, Jounsup Park:
Machine learning model evaluation for 360° video caching. 238-244 - Maria Ramirez, Mohammad Affan Khalil, Johnny Can, Kiran George:

Classification of "Like" and "Dislike" Decisions From EEG and fNIRS Signals Using a LSTM Based Deep Learning Network. 252-255 - Jacob Koch, Wei Hao:

Practical Applications of Edge Computing to Accelerate Cloud Hosted Web Content. 256-263 - Patrick Kopacz, Md Minhaz Chowdhury:

Cloud Computing Security and Future. 264-269 - Eric M. Toth, Md Minhaz Chowdhury:

Honeynets and Cloud Security. 270-275 - Audrey Long, Daniel Choi, Joel Coffman:

Using Amazon Managed Blockchain for ePHI An Analysis of Hyperledger Fabric and Ethereum. 276-282 - Shereen Ismail

, Hassan Reza:
Evaluation of Naïve Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks. 283-289 - Lap-Man Hoi

, Yuqi Sun
, Sio Kei Im:
An Automatic Speech Segmentation Algorithm of Portuguese based on Spectrogram Windowing. 290-295 - Khan Md. Hasib

, Shadman Sakib
, Jubayer Al Mahmud
, Kamruzzaman Mithu, Md. Saifur Rahman, Mohammad Shafiul Alam:
COVID-19 Prediction based on Infected Cases and Deaths of Bangladesh using Deep Transfer Learning. 296-302 - Kayla Lee, Kiran George:

Pulse and Signal Data Classification Using Conventional and Few-Shot Machine Learning. 311-317 - Javier de la Cruz, Douglas Shimizu, Kiran George:

EEG and fNIRS Analysis Using Machine Learning to Determine Stress Levels. 318-322 - Mohamed Bin Alhaj

, Hexu Liu, Osama Abudayyeh, Mohammed Sulaiman:
Development of a mobile application for occupant-centric facility maintenance management. 323-329 - David Mayo, Heba Elgazzar

:
Predicting Cryptocurrency Price Change Direction from Supply-Side Factors via Machine Learning Methods. 330-336 - Benedicta Nana Esi Nyarko

, Wu Bin, Jinzhi Zhou, George Kofi Agordzo
, Justice Odoom, Ebenezer Koukoyi
:
Comparative Analysis of AlexNet, Resnet-50, and Inception-V3 Models on Masked Face Recognition. 337-343 - Francis Liri, Austin Luu, Kiran George, Axel Angulo, Johnathan Dittloff:

Real-Time Dynamic Object Grasping with a Robotic Arm: A Design for Visually Impaired Persons. 344-350 - Abdullah Al-Monsur, M. D. Rizwanul Kabir, Abrar Mohammad Ar-Rafi, Mirza Muntasir Nishat, Fahim Faisal:

Covid-EnsembleNet: An Ensemble Based Approach for Detecting Covid-19 by utilising Chest X-ray Images. 351-356 - Ehsan Naderi

, Arash Asrari:
Toward Detecting Cyberattacks Targeting Modern Power Grids: A Deep Learning Framework. 357-363 - Chukwuemeka Duru, Jumoke Ladeji-Osias, Ketchiozo Wandji, Otily Toutsop, Rachida Kone:

A Review of Human Immune Inspired Algorithms for Intrusion Detection Systems. 364-371 - Aakib Bin Nesar, Tahseena Mahmud, Fahreen Hossain:

Simulating the Behaviour and Displacement of Women in Water-Stressed Areas. 372-378 - Lane Rizkallah, Nick Potter, Kyle Reed, Dylan Reynolds, Mohammed Salman

, Suman Bhunia
:
Red Toad, Blue Toad, Hacked Toad? 379-386 - Bharat S. Rawal, Lingampally Shiva Kumar, Sriram Maganti, Varun Godha:

Comparative Study of Sha-256 Optimization Techniques. 387-392 - Antonio Ornatelli, Alessandro Giuseppi

, Andrea Tortorelli:
A Distributed Average Cost Reinforcement Learning approach for Power Control in Wireless 5G Networks. 393-399 - Aaniya Agrawala, Vidhi Katyal, Neha Pandey, Astha Jain, Vivekanand Jha

:
A Review on Energy Efficient Strategies for Corona Based Architecture in Wireless Sensor Networks. 400-406 - Razib Hayat Khan

, Jonayet Miah:
Performance Evaluation of a new one-time password (OTP) scheme using stochastic petri net (SPN). 407-412 - Xiaojie Mu, Cheol-Hong Min:

Wearable Sensing and Physical Exercise Recognition. 413-417 - Nicholas Foley, Chen-Hsiang Yu:

MusCare+: Muscle Monitoring for Anomalies. 425-430 - Cesar Martinez Melgoza, Kayla Lee, Tyler Groom, Nate Ruppert, Kiran George, Henry Lin:

Comparing Pretrained Image-Net CNN with a Siamese Architecture for Few-Shot Learning Applications in Radar Systems. 431-436 - Calum McCormack, Christopher Wallace, Peter Barrie, Gordon Morison:

Day ahead Power Demand Forecasting for Hybrid Power at the Edge. 437-441 - Chad O'Brien, Cheol-Hong Min:

Classification of Various Workout Motions Using Wearable Sensors. 442-446 - Armin Esmaeilzadeh, Mina Esmail Zadeh Nojoo Kambar

, Maryam Heidari:
Graph Attention Neural Network Distributed Model Training. 447-452 - Adenrele A. Ishola, Damian Valles

:
Using Machine Learning and Regression Analysis to Classify and Predict Danger Levels in Burning Sites. 453-459 - Mohammad Monirujjaman Khan, Md. Farabi Alam, Shoumik Mahabub Ridoy:

ComparativeAnalysisofARIMAandLSTMM achine Learning Algorithm for Stock PricePrediction. 460-465 - Abel Desoto, Ethan Santos, Francis Liri, Kenneth Faller, Devin Heng, Joshua Dodd, Kiran George, Julia Drouin:

Predicting Audio Training Learning Outcomes Using EEG Data and KNN Modeling. 466-470 - Salah-Eddine Mansour

, Abdelhak Sakhi, Larbi Kzaz, Amine Erroutbi, Abderrahim Sekkaki:
Electronic device for acquiring images of sardine cans. 471-475 - Nur Apriyanto, Yudi Priyadi

, Dana Sulistiyo Kusumo:
Extraction of Step Performed in Use Case Description as a Reference for Conformity of Sequence Diagrams Using Text Mining (Case Study: SRS APTU). 476-482 - Talha Hassan, Tauheed Khan Mohd:

Comparison of Task Performance and User Satisfaction Between Holographic and Standard QWERTY Keyboard. 483-488 - Laily Mariz A. Bengua, Vanessa Jane D. De Guzman, Danica Mae S. Macunat, Efren D. Villaverde, Aubee T. Mahusay, Renato R. Maaliw

, Ace C. Lagman
, Alvin S. Alon:
Salted Egg Cleaning and Grading System Using Machine Vision. 489-493 - Zhao Xiang Lim, Xiu Qi Ho, Daniel Zhonghao Tan, Weihan Goh:

Ensuring Web Integrity through Content Delivery Networks. 494-500 - Christopher Faircloth, Gavin Hartzell, Nathan Callahan, Suman Bhunia

:
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft. 501-507 - Outi-Marja Latvala

, Ivo Emanuilov
, Tatu Niskanen, Pia Raitio, Jarno Salonen, Diogo Santos, Katerina Yordanova:
Proof-of-Concept for a Granular Incident Management Information Sharing Scheme. 515-520 - Bhargavi Krishnamurthy, Sajjan G. Shiva:

Energy Efficient Double Critic Deep Deterministic Policy Gradient Framework for Fog Computing. 521-527 - Md Mahadi Hassan Sohan, Mohammad Monirujjaman Khan, Ipseeta Nanda

, Rajesh Dey
:
Fake Product Review Detection Using Machine Learning. 527-532 - Alonso Montesinos:

Profit Prediction based on Financial Statements using Deep Neural Network. 533-537 - Zahra Salsabila Hernanda, Hani'ah Mahmudah, Rahardhita Widyatra Sudibyo:

CNN-Based Hyperparameter Optimization Approach for Road Pothole and Crack Detection Systems. 538-543 - Khalid Raihan Talha, Koushik Bandapadya

, Mohammad Monirujjaman Khan:
Violence Detection Using Computer Vision Approaches. 544-550 - Balarupan Gowrienanthan, N. Kiruthihan, K. D. I. S. Rathnayake, Sisil Kumarawadu

, V. Logeeshan
:
Low-Cost Ensembling for Deep Neural Network based Non-Intrusive Load Monitoring. 551-556 - Mostaqim Hossain, Mubassir Habib, Mainuddin Hassan, Faria Soroni, Mohammad Monirujjaman Khan:

Research and Development of an E-commerce with Sales Chatbot. 557-564 - Kabir Hossain, Tonmoy Ghosh, Edward Sazonov:

Development of Cloud-based Infrastructure for Real Time Analysis of Wearable Sensor Signal. 565-570 - I. B. Chandra Irugalbandara, Abdul Salam Naseem, Sasmitha Perera, Velmanickam Logeeshan

:
HomeIO: Offline Smart Home Automation System with Automatic Speech Recognition and Household Power Usage Tracking. 571-577 - Tristan Erney, Md Minhaz Chowdhury:

A Survey of Intrusion Detection and Prevention Systems. 578-584 - Frank Antonucci, Md Minhaz Chowdhury:

Botnets as the Modern Attack Vector. 585-590 - Joseph Squillace

, May Bantan:
A Taxonomy of Privacy, Trust, and Security Breach Incidents of Internet-of-Things Linked to F(M).A.A.N.G. Corporations. 591-596 - Jamal Alotaibi, Lubna K. Alazzawi:

PPIoV: A Privacy Preserving-Based Framework for IoV- Fog Environment Using Federated Learning and Blockchain. 597-603 - Jack Li, Yi Hu:

Employing Edge Computing to Enhance Self-Defense Capabilities of IoT Devices. 604-610 - Ersin Elbasi:

A Robust Information Hiding Scheme Using Third Decomposition Layer of Wavelet Against Universal Attacks. 611-616 - Sudarshan S. Chawathe:

Automated Determination of Mushroom Edibility Using an Augmented Dataset. 617-623 - Christopher Le, Tauheed Khan Mohd:

Facial Detection in Low Light Environments Using OpenCV. 624-628 - Brook W. Abegaz:

ADMSV - A Differential Machine Learning based Steering Controller for Smart Vehicles. 629-634 - Sudarshan S. Chawathe:

Optical Features for Automated Determination of Agricultural Product Varieties. 635-641 - Rimma Dzhusupova

, Richa Banotra
, Jan Bosch, Helena Holmström Olsson:
Pattern Recognition Method for Detecting Engineering Errors on Technical Drawings. 642-648 - Fu-Shiung Hsieh:

A Hybrid Firefly-DE algorithm for Ridesharing Systems with Cost Savings Allocation Schemes. 649-653 - Shreehar Joshi, Eman Abdelfattah, Ryan Osgood:

Classification of Movie Success: A Comparison of Two Movie Datasets. 654-658 - Tania Angelina Hutajulu, Yudi Priyadi

, Arfive Gandhi
:
Text Data Processing in Requirement Specifications as a Reference for Similarities Between Use Case Diagrams and Use Case Descriptions for Smart Sleeping Lamp Application Documents. 665-671 - Junifar Adam Pamungkas, Yudi Priyadi

, Muhammad Johan Alibasa:
Measurement of Similarity Between Requirement Elicitation and Requirement Specification Using Text Pre-Processing in the Cinemaloka Application. 672-678 - Elsa Jelista Sari, Yudi Priyadi

, Rosa Reska Riskiana:
Implementation of Semantic Textual Similarity between Requirement Specification and Use Case Description Using WUP Method (Case Study: Sipjabs Application). 681-687 - Min Hyung Lee, Richard Kyung:

Mental Health Stigma and Natural Language Processing: Two Enigmas Through the Lens of a Limited Corpus. 688-691 - Afra Mashhadi, Ali Tabaraei, Yuting Zhan, Reza M. Parizi:

An Auditing Framework for Analyzing Fairness of Spatial-Temporal Federated Learning Applications. 699-707 - Ferdaus Ahmed, Zarin Tasnim, Masud Rana, Mohammad Monirujjaman Khan:

Development of Low Cost Smart Cane with GPS. 715-724 - Adam Borys, Abu Kamruzzaman

, Hasnain Nizam Thakur, Joseph C. Brickley, Md Liakat Ali, Kutub Thakur:
An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet. 725-729 - Miroslav Bures, Pavel Blazek, Jiri Nema, Hynek Schvach

:
Factors Impacting Resilience of Internet of Things Systems in Critical Infrastructure. 730-735 - Kumar Saurabh

, Tanuj Kumar, Uphar Singh
, O. P. Vyas, Rahamatullah Khondoker:
NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains. 736-742 - Praveen Sai Bere

, Mohammed Zafar Ali Khan:
Bit switching decoding of Cyclic Hamming codes for IoT applications. 743-748 - Vyas O'Neill, Ben Soh:

Applying Aspect-Oriented Design Methodology to Manage Time-Validity of Information in Internet-of-Things Systems. 749-752 - Kumar Saurabh

, Saksham Sood, P. Aditya Kumar, Uphar Singh
, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker:
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks. 753-759 - Yehan Kodithuwakku, Ashan Dhanuka Sandanayake, Chanuka Bandara, V. Logeeshan

:
IoT Based Healthcare Kit for Domestic Usage. 760-765 - AlaaAllah A. ElSabaa, Florimond Guéniat, Wenyan Wu

, Michael Ward:
Enhanced Data-Driven LoRa LP-WAN Channel Model in Birmingham. 766-772 - Urvi Goel, Kaial Mongia, Quanta Gupta, Hansika Rajput, Vivekanand Jha

:
Sparse Mobile Crowdsensing: Components and Frameworks. 773-778 - Ashan Dhanuka Sandanayake, Yehan Kodithuwakku, Chanuka Bandara, V. Logeeshan

:
Smart Three In One System For Indoor Safety Assurance. 779-785 - Amin H. Al-Ka'bi

:
Proposed Antenna Design for IoT and 5G-WiFi Applications. 786-790

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














