


default search action
16th IMCOM 2022: Seoul, South Korea
- 16th International Conference on Ubiquitous Information Management and Communication, IMCOM 2022, Seoul, Korea, Republic of, January 3-5, 2022. IEEE 2022, ISBN 978-1-6654-2678-7

- Hidemoto Nakada, Hideki Asoh:

A Method to Generate Posed Person Image with few Context Images. 1-6 - Sarerusaenye Ismail, Shahrinaz Ismail

:
A Preliminary Study of Cashless Payment Face Recognition System Development in Malaysia. 1-5 - Mohamed Hassan Abdel Hamied

:
Smart Home Appliances Control System and Smart Wireless Charger for Electric Vehicles. 1-8 - Yu Rong, Jinglong Jiang, Husna Mutahira, Mannan Saeed Muhammad:

Monocular Intra-vehicular Distance Estimation using Front Vehicle License Plate. 1-6 - Tran Anh Kiet, Nguyen Thi Le Quyen, Phan Hieu Ho, Trung Hung Vo

:
A Novel Approach for UAV-Aided Vehicle-to-Everything Networks. 1-4 - Sebastian Robson, Snehasish Banerjee

, Avneet Kaur:
Brand Post Popularity on Social Media: A Systematic Literature Review. 1-6 - Minho Kim, Youngsoo Do, Jaewook Jeon:

Wireless ECU reprogramming for multiple vehicles in factories and service centers via WiFi. 1-5 - Ayesha Jehan, Muhammad Zeeshan:

Comparative Performance Analysis of Code-Domain NOMA and Power-Domain NOMA. 1-6 - Abdulrahman Hussien Mustafa, Farah Mahmoud AbdelMoneim, Magy Gamal Matta, Toka Ossama Barghash, Walid Gomaa

:
Automatic Forecasting of Volcanoes Eruption Time. 1-8 - Thuong Le-Tien, Tai Nguyen

, Vy Huynh:
Developing a Chatbot system using Deep Learning based for Universities consultancy. 1-7 - Mahmood Qolizadeh, Mohammad Saniee Abadeh:

Feature Reuse in CNN for Human Proteins Localization. 1-5 - Nguyen Thu Nga

, Chu Huu Khanh, Nguyen Quy Tho:
An Investigation of The 5G LDPC and Polar Decoding Performance in Spatial Correlated MIMO-OFDMA System. 1-7 - Hana Munira Muhd Mukhtar

, Yasmin Yahya, Azizah Rahmat
, Roslan Ismail:
Timber Harvesting Residual Trees Damage Decision-Making for Sustainable Forest Management. 1-5 - Ji-Ho Park, Yijun Piao, Tae-Jin Lee:

RIS-based Energy and Data Transfer Protocol in IoT Networks. 1-4 - Syeda Rabia Arshad, Ishwa Obaid, Rameesha Gull, Muhammad Khuram Shahzad

:
Steel Defect Classification Using Machine Learning. 1-6 - Alexey S. Rodionov:

Network Probabilistic Connectivity: Optimal Structures II. 1-6 - Mohammed Adnan Islam, Muhammad Ehsan Rana

:
Utilization of Big Data with Cloud Computing in Modern Business Environment: A Review. 1-7 - Wei Chun Lew, Muhammad Ehsan Rana

, Vazeerudeen Abdul Hameed
:
A Comparative Investigation on the Use of Cloud Computing for Big Data Analytics. 1-8 - Abdul Hanan Minhas, Mohammad Daniyal Shaiq, Saad Ali Qureshi, Musa Dildar Ahmed Cheema, Shujaat Hussain, Kifayat Ullah Khan:

An Efficient Algorithm for Ranking Candidates in E-Recruitment System. 1-8 - Uakomba Mbasuva, Guy-Alain Lusilao-Zodi

:
Designing Ensemble Deep Learning Intrusion Detection System for DDoS attacks in Software Defined Networks. 1-8 - Suriana Ismail

, M. Aiman M. Hanafi, Roslan Ismail, Ahmad Shahrafidz Khalid, Faridah Sh Ismail:
Geo-Fencing Technique for Internship Placement- Use Cases Deliverables. 1-4 - Dongyan Nan

, Min Hyung Park, Woomin Nam, Yerin Kim, ShaoPeng Che
, Jang Hyun Kim:
Exploring User Experience of "Animal Crossing" via Semantic Network Approach. 1-4 - Shota Nakamura, Tomoko Kajiyama:

A More Effective Book Search System Utilizing Colors Reflecting Reader Impressions. 1-4 - Yoshihaya Takahashi, Atsuya Sonoyama, Takeshi Kamiyamaton, Masato Oguchi, Saneyasu Yamaguchi:

Person Identification Based on Accelerations on Drawing Figures with a Smartphone. 1-4 - Hoang Ngoc Tran

, Ty Trung Nguyen, Ton Hoang Nguyen, Bac Viet Nguyen, Hung Quang Cao, Jae Wook Jeon:
Online-Tuning of Speed and Position Controllers using Particle Swarm Optimization Algorithm for a BLDC Motor. 1-7 - Nafisa Anjum

, Pramit Dutta:
Identifying Counterfeit Products using Blockchain Technology in Supply Chain System. 1-5 - Vladimir V. Shakhov, Anastasia N. Yurgenson, Honglong Chen:

On Reliability of Pipeline Monitoring Sensor Networks. 1-3 - Zeeshan Ali, Waqas Nawaz

, Kifayat-Ullah Khan:
An Efficient Multi-Criteria Path Selection Approach in Road Networks through Influencer Nodes and K-hop Search. 1-7 - Seungjong Sun, Minwoo Kim, Dongyan Nan

, Jang-Hyun Kim:
Relationship between Hashtags Usage and Reach Rate in Instagram. 1-4 - ShaoPeng Che

, Pim Kamphuis, Shunan Zhang
, Jang-Hyun Kim:
RECP from the Perspective of Chinese Mainlanders and Taiwanese Netizens: A Comparative Semantic Network Analysis. 1-4 - Matthias Baumgart, Claudia Hösel, Manuel Heinzig, Matthias Vodel, Christian Roschke, Marc Ritter:

A Framework for an IT-based risk management for the third-party funding process in universities (TRINITY). 1-8 - Saeed Ur Rehman Bhatti

, Mohammad Daniyal Shaiq, Hira Sajid, Saad Ali Qureshi, Shujaat Hussain
, Kifayat Ullah Khan:
Resu-mizer: Hybrid Resume Information Retrieval System. 1-7 - Koushik Deb, Hemangee De, Seshadri Sekhar Chatterjee

, Anjan Pal:
Studying Borderline Personality Disorder Using Machine Learning. 1-6 - Sergey Kratov, Alexey Podsadnikov:

The Development of the Massive Open Online Course on Distance Forms of Research and Training. 1-7 - Abdulaziz Aborujilah, Abubaker-Eseddig Fathi Mahmoud Elsebaie, Shamsul Anuar Mokhtar, Zalizah Awang Long, Shafiza Mohd Shariff, Nur Syahela Hussien, Mohd Nizam Husen:

A Conceptual Framework for an Integrated Healthcare Information Systems from an Organizational Perspective. 1-8 - Pham Van Nguyen, Duc-Tai Le, Su Jeong Song, Hyunseung Choo:

Towards AI based Ophthalmological Screening through Ultra-widefield Fundus Image to Conventional Fundus Image Translation. 1-3 - Yoga Pristyanto

, Anggit Ferdita Nugraha, Akhmad Dahlan
, Lucky Adhikrisna Wirasakti, Aditya Ahmad Zein, Irfan Pratama:
Multiclass Imbalanced Handling using ADASYN Oversampling and Stacking Algorithm. 1-5 - Hasibul Huda, Md. Ariful Islam Fahad, Moonmoon Islam, Amit Kumar Das

:
Bangla Handwritten Character and Digit Recognition Using Deep Convolutional Neural Network on Augmented Dataset and Its Applications. 1-7 - Asim Abbas, Jamil Hussain, Muhammad Afzal

, Hafiz Syed Muhammad Bilal, Sungyoung Lee, Seokhee Jeon:
Explicit and Implicit Section Identification from Clinical Discharge Summaries. 1-8 - Hii Lee Jia, Vazeerudeen Abdul Hameed

, Muhammad Ehsan Rana
:
CyberSaver - A Machine Learning Approach to Detection of Cyber Bullying. 1-5 - Kenji Matsuura, Hiroki Tanioka, Naka Gotoda, Tomohito Wada:

Self-studying environment with imagery rehearsal for a ball-carrier in basketball. 1-7 - Pildong Hwang, Yanggon Kim:

Data Cleaning of Sound Data with Label Noise Using Self Organizing Map. 1-5 - Thanh Cong Tran, Tran Khanh Dang

:
Machine Learning for Multi-Classification of Botnets Attacks. 1-8 - Toyohide Watanabe:

Knowledge Creation in Online Environment: Bridge between Self and Collaborative Studies. 1-8 - Hyunju Kim, Junwon Hwang, Taewoo Yoo, Yun-Gyung Cheong:

Improving a Graph-to-Tree Model for Solving Math Word Problems. 1-7 - Abdulaziz Aborujilah, Jibril Adamu, Shafiza Mohd Shariff, Zalizah Awang Long:

Descriptive Analysis of Built-in Security Features in Web Development Frameworks. 1-8 - Nhat Hoang Bach, Lang Vu Hai, Giang Tran Quang, Due Nguyen Van, Le Ha Vu, Trung Trinh Xuan:

Optimizing baseline in USBL using Costas hopping to increase navigation precision in shallow water. 1-6 - Dat Vuong

, Tran The Son, Duong Huu Ai
, Trong-Hop Do, C. P. Huynh, Hung N. Tan, N. V. A. Quang, Tttvinh:
A Novel Integrated Model for Positioning Indoor MISO VLC Exploiting Non-Light-of-Sight Communication. 1-5 - Snehasish Banerjee

, Ariadne Beatrice Kapetanaki, Lauren Dempsey:
Older People's Online Information Search During the Pandemic. 1-6 - Sarah Kiyani, Musa Dildar Ahmed Cheema, Saad Ali Qureshi, Shujaat Hussain, Kifayat Ullah Khan:

Feature-Wise Ranking of Candidates through Maximum Degrees in Hidden Bipartite Graphs. 1-8 - Muhammad Fasih Ashfaq, Maryam Malik, Urooj Fatima, Muhammad Khuram Shahzad:

Classification of IoT based DDoS Attack using Machine Learning Techniques. 1-6 - Nguyen Le Hoang, Tran Khanh Dang

:
Alpha Lightweight Coreset for k-Means Clustering. 1-8 - Ubaid Ur Rehman, Amir Ali

, Hafiz Syed Muhammad Bilal, Muhammad Asif Razzaq
, Seong-Bae Park, Sungyoung Lee:
A Novel Mutual Trust Evaluation Method for Identification of Trusted Devices in Smart Environment. 1-4 - Taketoshi Ushiama, Tenyu Kawaguchi:

Estimating Neutrality of News Articles and Reactions on Twitter. 1-8 - Yuh-Yih Lu, Feng-Cheng Chang, Hsiang-Cheh Huang, Po-Liang Chen:

Comparisons of Reconstruction Capabilities for Lossy Transmission with Block-Based Compressed Sensing. 1-4 - Huu-Hung Nguyen, The-Tien Nguyen, Xuan-Phuc Nguyen, Cong-Manh Tran

, Quang-Thi Nguyen:
Multiple Frame Integration for Essential Matrix-based Visual Odometry. 1-6 - Amin Ahmadi Kasani

, Hedieh Sajedi:
Predict joint angle of body parts based on sequence pattern recognition. 1-5 - Hira Sajid, Javeria Kanwal, Saeed Ur Rehman Bhatti

, Saad Ali Qureshi, Amna Basharat
, Shujaat Hussain, Kifayat Ullah Khan:
Resume Parsing Framework for E-recruitment. 1-8 - Young Soo Do, Min Ho Kim, Jae Wook Jeon:

Implementation and Performance Analysis of Time-Determined Forwarding and Queuing Functions Based on IEEE 802.1Qav. 1-6 - Tien Pham Van, Chung Duc Nguyen Dang

:
Urgency-differentiated Data Acquisition in Large UAV-integrated IoT Systems. 1-6 - Mingue Song, Yanggon Kim:

Deep Representation for the Classification of Ultrasound Breast Tumors. 1-6 - Ton Hoang Nguyen, Ty Trung Nguyen, Hoang Ngoc Tran

, Jae Wook Jeon:
An Improved Sliding Mode Control Using Reduced-order PI Observer for PMSM system. 1-5 - Paaras Chand, Melody Moh, Teng-Sheng Moh

:
An Approach to Improving Anomaly Detection Using Multiple Detectors. 1-8 - Dejun Kong

, Xiaofeng Gao, Guihai Chen:
Collection Tree for Wireless Coverage Problem in Mobile Crowdsensing. 1-7 - Rakesh Gururaj, Melody Moh, Teng-Sheng Moh

, Philip Shilane, Bhimsen Bhanjois:
Performance Centric Primary Storage Deduplication Systems Exploiting Caching and Block Similarity. 1-8 - Mohammad Fahim Arefin

, Chowdhury Farhan Ahmed, Redwan Ahmed Rizvee, Carson K. Leung
, Longbing Cao
:
Mining Contextual Item Similarity without Concept Hierarchy. 1-8 - Hibbah Nadeem, Rukhma Tassadaq, Mobeen Nazar, Ahsan Mustufa:

Probec: A Product hunting tool. 1-7 - Changhoon Song, Sukhan Lee:

Accurate Non-Contact Body Temperature Measurement with Thermal Camera under Varying Environment Conditions. 1-6 - Yuanyuan Wang

:
Hotel Recommendation based on Review Analysis by Considering Tourism Needs. 1-8 - Jihyeon Ryu, Dongho Won, Youngsook Lee:

A Study of Split Learning Model. 1-4 - Tran Anh Kiet, Tuan Cao Xuan, Phan Hieu Ho, Nguyen Thi Le Quyen, Phuong Hoai Dang, Vo Trung Hung

:
Power Minimization for Data Collection in UAV-Assisted IoT Wireless Sensor Networks. 1-3 - Maslinda Mohd Nadzir, Baktajivan Pillay:

A mobile game approach for energy conservation awareness. 1-4 - Nhan Trinh, Duc M. Duong, Binh Tran, Hoai Su:

Hybrid Neural Networks for Electroencephalography Motor Imaging Classification. 1-6 - Tianxiang Hu, Jiyi Li, Fumiyo Fukumoto, Renjie Zhou:

A Multi-task based Bilateral-Branch Network for Imbalanced Citation Intent Classification. 1-8 - Amir Aslan Aslani, Mohammad Zolfaghari, Hedieh Sajedi:

Automatic Counting Red Blood Cells in the Microscopic Images by EndPoints Method and Circular Hough Transform. 1-5 - Ishrat Jahan Yra, Maksud Hossain Pranto, Amit Kumar Das

:
HELLO: An Android-based Mobile Application for Autism Individuals to Improve Socio-Communicational Learnability in Bangladesh. 1-7 - Younghoon Jang, Syed M. Raza

, Hyunseung Choo, Moonseong Kim:
UAVs Handover Decision using Deep Reinforcement Learning. 1-4 - Niloofar Jazayeri, Farnaz Jazayeri, Hedieh Sajedi:

Medical Image Segmentation for Skin Lesion Detection via Topological Data Analysis. 1-8 - B. Fatokun Faith, Zalizah Awang Long, Suraya Hamid, O. Fatokun Johnson, Christopher Ifeanyi Eke, Azah Anir Norman:

An Intelligent Gamification Tool to Boost Young Kids Cybersecurity Knowledge on FB Messenger. 1-8 - Tien Pham Van, Chung Duc Nguyen Dang

:
Underwater Searching based on AUV - ASV Cooperation. 1-7 - Fahad Ahmed Satti, Musarrat Hussain

, Sungyoung Lee, TaeChoong Chung:
Significance of Syntactic Type Identification in Embedding Vector based Schema Matching. 1-6 - Qingqing Chen, Dingsheng Wan, Yufeng Yu, Ke Li:

Intelligent Water Level Prediction Model for small-and medium-sized rivers Based on Small Sample Data. 1-7 - Thien-Binh Dang, Duc-Tai Le, Moonseong Kim, Hyunseung Choo:

A General Model for Long-short Term Anomaly Generation in Sensory Data. 1-5 - Pranathi Padidem, Ahyoung Lee:

Studying Offloading Optimization for Energy-Latency Tradeoff with Collaborative Edge Computing. 1-6 - Mazen Khodier, Ahmed Abdelaziz, Maria Gadelkarim, Abdelrahman Abdelkhalek, Walid Gomaa

:
Sorting of Scrambled Video Frames Using Temporal Order Verification. 1-8 - Omar Alaaeldein

, Omar Sayed El Ahl, Lamiaa Elmahy, Martin Ihab, Walid Gomaa
:
Analysis of COVID-19 Using Imaging and Audio Modalities. 1-10 - Joshua F. Smallwood, Chenru Zhao, Carson K. Leung

, Yan Wen, Hao Zheng:
Mining the Impacts of COVID-19 Pandemic on the Labour Market. 1-8 - Justyna Zywiolek

, Achyuth Sarkar, Muhammad Safdar Sial
:
Biometrics as a method of employee control. 1-5 - Paulino Cristovao, Hidemoto Nakada, Yusuke Tanimura, Hideki Asoh:

Few Shot Model based on Weight Imprinting with Multiple Projection Head. 1-7 - Kamalanathan Shanmugam, Muhammad Ehsan Rana

, Grace Ong:
IoT based Indoor Senior Citizen Monitoring and Alerting System. 1-4 - Seho Bae, Nizam Ud Din

, Hyunkyu Park
, Juneho Yi:
Face Photo-Sketch Recognition Using Bidirectional Collaborative Synthesis Network. 1-8 - Ha Thi The Nguyen

, Ling-Hsiu Chen, Vani Suthamathi Saravanarajan:
Using Feed-forward Backprop, Perceptron, and Self-organizing Algorithms to Predict Students' Online Behavior. 1-5 - YuJia Han, Miyuki Nakano, Masato Oguchi:

Music recommendation service based on user impressions: Study of user interface acquiring appropriate impression words. 1-8 - Jiyoung Yoon, Muhammad Junaid, Sajid Ali, Jongwuk Lee:

Abstractive Summarization of Korean Legal Cases using Pre-trained Language Models. 1-7 - Ahmed Fayez, Ahmed Sharshar

, Ahmed Hesham, Islam Eldifrawi
, Walid Gomaa
:
ValS: A Leading Visual and Inertial Dataset of Squats. 1-8 - Ritu Chauhan, Aparajita Sengupta, Eiad Yafi:

Artificial Intelligence an Influential Review: Pandemic Scenario. 1-7 - Waseem Abbas, Munkyo Seo:

A gain boosted single stage wideband InP HBT amplifier for terahertz applications. 1-4 - Gatha Varma

, Ritu Chauhan:
Cybercriminals Strike Where It Hurts Most: SARS-Cov-2 Pandemic and its Influence on Critical Infrastructure Ransomware Attacks. 1-7 - Ju-Chan Kim, Duc-Tai Le, Su Jeong Song, Chang-Hwan Son, Hyunseung Choo:

Multi-modal Fundus Image Registration with Deep Feature Matching and Image Scaling. 1-3 - Jung Rok Kim, Jae Wook Jeon:

Real-time Scale and Rotation Invariant Multiple Template Matching. 1-5 - Huaze Xie, Da Li, Yuanyuan Wang

, Yukiko Kawai:
Analysis and Forecast of the COVID-19 Spreading Curve for the Resumption of In-person Classes. 1-4 - Dongwoo Kang, Hoil Ryu, Dongho Won:

Implementation on Partially Verifiable Multi-signature Scheme in Electronic Contract Systems. 1-4 - Rudi Susanto

, Mohd Nizam Husen, Adidah Lajis:
The Product Development of Portable Laboratory Integrated with Local Wisdom (PL-ILW) by Undergraduate Student. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














