default search action
14th IMCOM 2020: Taichung, Taiwan
- 14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020, Taichung, Taiwan, January 3-5, 2020. IEEE 2020, ISBN 978-1-7281-5453-4
- Huigyu Yang, Syed M. Raza, Moonseong Kim, Duc-Tai Le, Van Vi Vo, Hyunseung Choo:
Next Point-of-Attachment Selection Based on Long Short Term Memory Model in Wireless Networks. 1-4 - Yohan Joo, Kyutae Kim, Jongpil Jeong:
Performance Comparison of Machine Learning Algorithms for Imbalanced Class Classification in Hydraulic System. 1-8 - Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment. 1-4 - Sharan Duggirala, Teng-Sheng Moh:
A Novel Approach to Music Genre Classification using Natural Language Processing and Spark. 1-8 - Sungwoo Lee, Yongju Song, Young Ik Eom:
PollO: Polling-aware On-demand Governor for Improving Power Efficiency. 1-4 - Kofi Osei-Tutu, Yeong-Tae Song:
Enterprise Architecture for Healthcare Information Exchange (HIE) Cloud Migration. 1-8 - Tomoko Kajiyama:
Evaluation of Improved Botanical Search Application for Elementary School Students. 1-5 - Nguyen Anh Tu, Thien Huynh-The, Kok-Seng Wong, Dinh-Mao Bui, Young-Koo Lee:
Distributed Feature Extraction on Apache Spark for Human Action Recognition. 1-6 - Yijun Piao, Yunmin Kim, Tae-Jin Lee:
Multi-Beam Connection Request Transmission Scheme for 5G Initial Access. 1-4 - Sewan Ha, Hakjun Lee, Dongho Won, Youngsook Lee:
Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS. 1-8 - Min Wei, Cheng Li, Caiqin Li:
An IPv6 Internet Accessing Architecture and Approach for Industrial Wireless Network. 1-6 - Wentong Zhou, Taketoshi Ushiama:
Automatic Generation of Pictorial Maps from Photos on Social Media to Represent Regional Features. 1-5 - Cam-Hao Hua, Thien Huynh-The, Hyunseok Seo, Sungyoung Lee:
Convolutional Network with Densely Backward Attention for Facial Expression Recognition. 1-6 - Jasrina Jaffar, Ahmad Faeez Abdul Malik, Megat Farez Azril Zuhairi, Aznida Abu Bakar Sajak, Mohd Taha Ismail:
Development of the LoRaWAN-based Movement Tracking System. 1-6 - Hamidreza Lotfalizadeh, Dongsoo S. Kim:
Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows. 1-6 - Nurul Shuhadah Rosni, Zahidah Abd Kadir, Megat Norulazmi Megat Mohamed Noor, Zaidatul Husna Abdul Rahman, Nurulain Abu Bakar:
Development of mobile markerless augmented reality for cardiovascular system in anatomy and physiology courses in physiotherapy education. 1-5 - Arshad Iqbal, Tae-Jin Lee:
Communication MAC Protocol for Coexisting Wireless Devices and Backscatter Tags. 1-6 - Yasmin Yahya, Roslan Ismail:
Tree-mapping Technique as a Computer System for Sustainable Forest Management. 1-6 - Md. Nazmus Saadat, Hasibul Kabir, Zalizah Awang Long, Hannah Sofian, Megat Farez Azril Zuhairi:
Efficient Face Detection And Identification In Networked Video Surveillance Systems. 1-9 - Noriyuki Iwane, Mitsuaki Yamaguchi:
Towards Making Regional Issues of Marine Resources a Teaching and Learning Material. 1-4 - Dongwoo Kang, Hakjun Lee, Dongho Won, Youngsook Lee:
Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem. 1-8 - Sukhan Lee, Wencan Cheng:
Progressive Framework of Learning 3D Object Classes and Orientations from Deep Point Cloud Representation. 1-6 - Kento Shigyo, Hidenari Kiyomitsu, Kazuhiro Ohtsuki:
Visualization of Texture Expressions for Recipes by Using Reviews. 1-4 - WooHyun Park:
Intelligent Camera Using a Finite-State Machine (FSM). 1-9 - Tran Trong Khanh, Tran Hoang Hai, Vandung Nguyen, Tri D. T. Nguyen, Ngo Thien Thu, Eui-Nam Huh:
The Practice of Cloud-based Navigation System for Indoor Robot. 1-4 - Chu-Hsing Lin, Po-Kai Yang, Yu-Chiao Lin:
Detecting Security Breaches in Personal Data Protection with Machine Learning. 1-7 - Taejin Ko, Syed M. Raza, Thien-Binh Dang, Moonseong Kim, Hyunseung Choo:
Network Prediction with Traffic Gradient Classification using Convolutional Neural Networks. 1-4 - Junyoung Jung, Jinsung Cho, Ben Lee:
A Secure Platform for IoT Devices based on ARM Platform Security Architecture. 1-4 - Tae Hyung Lee, Young Ik Eom:
VCPU Prioritization Interface for Improving the Performance of Latency-Critical Tasks. 1-4 - Ravali Koppaka, Teng-Sheng Moh:
Machine Learning in Indian Crop Classification of Temporal Multi-Spectral Satellite Image. 1-8 - Suriana Ismail, Roslan Ismail:
Community Detection Framework based on Multi-Strengthening Approach. 1-4 - Akbar Majidi, Xiaofeng Gao, Nazila Jahanbakhsh, Jiaqi Zheng, Guihai Chen:
Priority Policy in Multi-Queue Data Center Networks via per-Port ECN Marking. 1-8 - Miki Imai, Miki Enoki, Ruriko Kudo, Masato Oguchi:
Personalized Local Event Search Based on SNS Data Analysis. 1-9 - Shafiza Mohd Shariff:
A Review on Credibility Perception of Online Information. 1-7 - Arif Warsi, Munaisyah Abdullah, Mohd Nizam Husen, Muhammad Yahya:
Automatic Handgun and Knife Detection Algorithms: A Review. 1-9 - Toyohide Watanabe:
Skill Training Support in Education/Learning Field. 1-8 - Ha Phan Khanh Nguyen, Van Long Do, Quang Trung Dong:
A Parallel Neural Network-based Scheme for Radar Emitter Recognition. 1-8 - Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Mohd Nizam Husen, Zalizah Awang Long, Nor Azlina Ali, Vickneshwaran A. L. Murugan:
Adoption and Continuance Intention Model of Applying Telemedicine Technology in Digital Games Addiction. 1-9 - Naoki Mizusawa, Yuya Seki, Jian Tao, Saneyasu Yamaguchi:
A Study on I/O Performance in Highly Consolidated Container-Based Virtualized Environment on OverlayFS with Optimized Synchronization. 1-4 - Dinh-Mao Bui, Nguyen Anh Tu, Kok-Seng Wong:
Enhancing the Adaptiveness of Gaussian Process Regression based on Power Spectral Density. 1-6 - John J. Lee, Dan Koo, Dinaol Tadesse, Atharv Jain, Sushmitha Shettar, Dongsoo Kim:
Emergency Evacuation Assistance. 1-6 - Le Hong Trang, Nguyen Le Hoang, Tran Khanh Dang:
A Farthest First Traversal based Sampling Algorithm for k-clustering. 1-6 - Yusuke Yasumura, Takashi Ito, Kenichi Takahashi, Tomoko Kajiyama:
Effects on Concentration of Different E-Learner Resting Behaviors in Reponse to Communication Robot Actions During Break Times. 1-5 - Nobuyuki Kobayashi, Hiromitsu Shiina, Takafumi Ohtani:
Comment Evaluation using Mutual Method, LSTM, Bootstrap and Co-occurrence word in Lecture Questionnaire. 1-7 - Syed Imran Ali, Sungyoung Lee:
Ensemble based Cost-Sensitive Feature Selection for Consolidated Knowledge Base Creation. 1-7 - Luan N. T. Huynh, Quoc-Viet Pham, Tri D. T. Nguyen, Md. Delowar Hossain, Jae Ho Park, Eui-Nam Huh:
A Study on Computation Offloading in MEC Systems using Whale Optimization Algorithm. 1-4 - Kousuke Okumura, Tutomu Murase:
User Cooperative Mobility with Optimal Node Selection for High Throughput in Multiple Ad-Hoc Networks. 1-7 - Alexey S. Rodionov:
Some New Ideas About Obtaining and Estimating Reliability Polynomial of a Random Graph. 1-5 - Thien Huynh-The, Cam-Hao Hua, Nguyen Anh Tu, Jae-Woo Kim, Seung-Hwan Kim, Dong-Seong Kim:
3D Action Recognition Exploiting Hierarchical Deep Feature Fusion Model. 1-3 - Melody Moh, Teng-Sheng Moh, Brian Khieu:
No "Love" Lost: Defending Hate Speech Detection Models Against Adversaries. 1-6 - Nur Zaimah Ahmad, Megat F. Zuhairi, Hassan Dao, Eiad Yafi:
DNS Server Caching and Forwarding with Load Balance. 1-5 - Chu-Hsing Lin, Jung-Chun Liu, Po-Kai Yang:
Performance Enhancement of GPU Parallel Computing Using Memory Allocation Optimization. 1-5 - Sangwon Kim, Thummin Lee, Keecheon Kim:
Research on the traffic type recognition technique for advanced network control using Floodlight. 1-6 - Dylan Wang, Melody Moh, Teng-Sheng Moh:
Using Deep Learning to Solve Google reCAPTCHA v2's Image Challenges. 1-5 - Liang Jung, Wen-Hung Liao, Yi-Chieh Wu:
Toward Automatic Recognition of Cursive Chinese Calligraphy : An Open Dataset For Cursive Chinese Calligraphy Text*. 1-5 - Shu Yano, Kenji Matsuura, Hiroki Tanioka, Stephen Karungaru, Naoya Kohda, Naka Gotoda, Tomohito Wada:
Tactics-Trend Analysis for Increasing the Possibility of Shooting in a Basketball Match. 1-4 - Takumi Kuramoto, Shuji Abe, Hiroaki Ishihata:
Sex Classification of Salmon Using Convolutional Neural Network. 1-4 - Zahidah Abd Kadir, Nurul Shuhadah Rosni, Bazilah A. Talip, Mohd Amin Che Mohd Shabri:
Mobile Marker-based Augmented Reality Coloring Sheets Development for Dengue Awareness. 1-5 - AbdulAleem Al-Othmani, Azizah Abdul Manaf, Akram M. Zeki, Qusay Al-Maatouk, Abdulaziz Aborujilah, Maen T. Al-Rashdan:
Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech Signal. 1-6 - Emil Thorstensen Jensen, Martin Hansen, Evelyn Eika, Frode Eika Sandnes:
Country Selection on Web Forms: A Comparison of Dropdown Menus, Radio Buttons and Text Field with Autocomplete. 1-4 - Muhammad Sadiq, Syed Imran Ali, Muhammad Bilal Amin, Sungyoung Lee:
A Vertex Matcher for Entity Resolution on Graphs. 1-4 - SeongKu Kang, Junyoung Hwang, Hwanjo Yu:
Multi-Modal Component Embedding for Fake News Detection. 1-6 - Ying Chieh Liu, Yu-An Huang:
Information Systems Outsourcing Success- A Perspective of Information Processing Theory. 1-3 - Jaeeun Shin, Sangwon Lee:
Intimacy Between Actual Users and Virtual Agents: Interaction through "likes" and "comments". 1-4 - Sung Yon Park, Dong In Kim:
Intelligent Reflecting Surface-aided Phase-Shift Backscatter Communication. 1-5 - Haekwon Jeong, Syed M. Raza, Dung T. Nguyen, Siwon Kim, Moonseong Kim, Hyunseung Choo:
Control Plane Design for Failure Protection in Software Defined Service Function Chains. 1-6 - Zhafri Hariz Roslan, Zalizah Awang Long, Mohd Nizam Husen, Roslan Ismail, Robiah Hamzah:
Deep Learning for Tree Crown Detection In Tropical Forest. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.