


default search action
14th IMCOM 2020: Taichung, Taiwan
- 14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020, Taichung, Taiwan, January 3-5, 2020. IEEE 2020, ISBN 978-1-7281-5453-4

- Huigyu Yang, Syed M. Raza

, Moonseong Kim, Duc-Tai Le, Van Vi Vo, Hyunseung Choo:
Next Point-of-Attachment Selection Based on Long Short Term Memory Model in Wireless Networks. 1-4 - Yohan Joo, Kyutae Kim, Jongpil Jeong:

Performance Comparison of Machine Learning Algorithms for Imbalanced Class Classification in Hydraulic System. 1-8 - Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won:

Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment. 1-4 - Sharan Duggirala, Teng-Sheng Moh

:
A Novel Approach to Music Genre Classification using Natural Language Processing and Spark. 1-8 - Sungwoo Lee, Yongju Song, Young Ik Eom:

PollO: Polling-aware On-demand Governor for Improving Power Efficiency. 1-4 - Kofi Osei-Tutu, Yeong-Tae Song:

Enterprise Architecture for Healthcare Information Exchange (HIE) Cloud Migration. 1-8 - Tomoko Kajiyama:

Evaluation of Improved Botanical Search Application for Elementary School Students. 1-5 - Nguyen Anh Tu

, Thien Huynh-The
, Kok-Seng Wong
, Dinh-Mao Bui, Young-Koo Lee:
Distributed Feature Extraction on Apache Spark for Human Action Recognition. 1-6 - Yijun Piao, Yunmin Kim, Tae-Jin Lee:

Multi-Beam Connection Request Transmission Scheme for 5G Initial Access. 1-4 - Sewan Ha, Hakjun Lee, Dongho Won, Youngsook Lee:

Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS. 1-8 - Min Wei, Cheng Li, Caiqin Li:

An IPv6 Internet Accessing Architecture and Approach for Industrial Wireless Network. 1-6 - Wentong Zhou, Taketoshi Ushiama:

Automatic Generation of Pictorial Maps from Photos on Social Media to Represent Regional Features. 1-5 - Cam-Hao Hua

, Thien Huynh-The
, Hyunseok Seo, Sungyoung Lee:
Convolutional Network with Densely Backward Attention for Facial Expression Recognition. 1-6 - Jasrina Jaffar

, Ahmad Faeez Abdul Malik, Megat Farez Azril Zuhairi, Aznida Abu Bakar Sajak
, Mohd Taha Ismail:
Development of the LoRaWAN-based Movement Tracking System. 1-6 - Hamidreza Lotfalizadeh, Dongsoo S. Kim:

Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows. 1-6 - Nurul Shuhadah Rosni, Zahidah Abd Kadir

, Megat Norulazmi Megat Mohamed Noor, Zaidatul Husna Abdul Rahman, Nurulain Abu Bakar:
Development of mobile markerless augmented reality for cardiovascular system in anatomy and physiology courses in physiotherapy education. 1-5 - Arshad Iqbal

, Tae-Jin Lee:
Communication MAC Protocol for Coexisting Wireless Devices and Backscatter Tags. 1-6 - Yasmin Yahya, Roslan Ismail:

Tree-mapping Technique as a Computer System for Sustainable Forest Management. 1-6 - Md. Nazmus Saadat, Hasibul Kabir, Zalizah Awang Long

, Hannah Sofian, Megat Farez Azril Zuhairi:
Efficient Face Detection And Identification In Networked Video Surveillance Systems. 1-9 - Noriyuki Iwane, Mitsuaki Yamaguchi:

Towards Making Regional Issues of Marine Resources a Teaching and Learning Material. 1-4 - Dongwoo Kang, Hakjun Lee, Dongho Won, Youngsook Lee:

Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem. 1-8 - Sukhan Lee, Wencan Cheng:

Progressive Framework of Learning 3D Object Classes and Orientations from Deep Point Cloud Representation. 1-6 - Kento Shigyo, Hidenari Kiyomitsu

, Kazuhiro Ohtsuki:
Visualization of Texture Expressions for Recipes by Using Reviews. 1-4 - WooHyun Park:

Intelligent Camera Using a Finite-State Machine (FSM). 1-9 - Tran Trong Khanh, Tran Hoang Hai

, Vandung Nguyen
, Tri D. T. Nguyen, Ngo Thien Thu, Eui-Nam Huh:
The Practice of Cloud-based Navigation System for Indoor Robot. 1-4 - Chu-Hsing Lin, Po-Kai Yang, Yu-Chiao Lin:

Detecting Security Breaches in Personal Data Protection with Machine Learning. 1-7 - Taejin Ko, Syed M. Raza

, Thien-Binh Dang, Moonseong Kim, Hyunseung Choo:
Network Prediction with Traffic Gradient Classification using Convolutional Neural Networks. 1-4 - Junyoung Jung, Jinsung Cho, Ben Lee:

A Secure Platform for IoT Devices based on ARM Platform Security Architecture. 1-4 - Taehyung Lee, Young Ik Eom:

VCPU Prioritization Interface for Improving the Performance of Latency-Critical Tasks. 1-4 - Ravali Koppaka, Teng-Sheng Moh

:
Machine Learning in Indian Crop Classification of Temporal Multi-Spectral Satellite Image. 1-8 - Suriana Ismail

, Roslan Ismail:
Community Detection Framework based on Multi-Strengthening Approach. 1-4 - Akbar Majidi

, Xiaofeng Gao, Nazila Jahanbakhsh, Jiaqi Zheng, Guihai Chen
:
Priority Policy in Multi-Queue Data Center Networks via per-Port ECN Marking. 1-8 - Miki Imai, Miki Enoki, Ruriko Kudo, Masato Oguchi:

Personalized Local Event Search Based on SNS Data Analysis. 1-9 - Shafiza Mohd Shariff

:
A Review on Credibility Perception of Online Information. 1-7 - Arif Warsi, Munaisyah Abdullah

, Mohd Nizam Husen, Muhammad Yahya
:
Automatic Handgun and Knife Detection Algorithms: A Review. 1-9 - Toyohide Watanabe:

Skill Training Support in Education/Learning Field. 1-8 - Ha Phan Khanh Nguyen, Van Long Do, Quang Trung Dong:

A Parallel Neural Network-based Scheme for Radar Emitter Recognition. 1-8 - Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Mohd Nizam Husen, Zalizah Awang Long

, Nor Azlina Ali, Vickneshwaran A. L. Murugan:
Adoption and Continuance Intention Model of Applying Telemedicine Technology in Digital Games Addiction. 1-9 - Naoki Mizusawa, Yuya Seki, Jian Tao

, Saneyasu Yamaguchi:
A Study on I/O Performance in Highly Consolidated Container-Based Virtualized Environment on OverlayFS with Optimized Synchronization. 1-4 - Dinh-Mao Bui, Nguyen Anh Tu

, Kok-Seng Wong
:
Enhancing the Adaptiveness of Gaussian Process Regression based on Power Spectral Density. 1-6 - John J. Lee

, Dan Koo, Dinaol Tadesse, Atharv Jain, Sushmitha Shettar, Dongsoo Kim:
Emergency Evacuation Assistance. 1-6 - Le Hong Trang

, Nguyen Le Hoang, Tran Khanh Dang
:
A Farthest First Traversal based Sampling Algorithm for k-clustering. 1-6 - Yusuke Yasumura, Takashi Ito, Kenichi Takahashi, Tomoko Kajiyama:

Effects on Concentration of Different E-Learner Resting Behaviors in Reponse to Communication Robot Actions During Break Times. 1-5 - Nobuyuki Kobayashi, Hiromitsu Shiina, Takafumi Ohtani:

Comment Evaluation using Mutual Method, LSTM, Bootstrap and Co-occurrence word in Lecture Questionnaire. 1-7 - Syed Imran Ali, Sungyoung Lee:

Ensemble based Cost-Sensitive Feature Selection for Consolidated Knowledge Base Creation. 1-7 - Luan N. T. Huynh, Quoc-Viet Pham

, Tri D. T. Nguyen, Md. Delowar Hossain
, Jae Ho Park, Eui-Nam Huh:
A Study on Computation Offloading in MEC Systems using Whale Optimization Algorithm. 1-4 - Kousuke Okumura, Tutomu Murase:

User Cooperative Mobility with Optimal Node Selection for High Throughput in Multiple Ad-Hoc Networks. 1-7 - Alexey S. Rodionov:

Some New Ideas About Obtaining and Estimating Reliability Polynomial of a Random Graph. 1-5 - Thien Huynh-The

, Cam-Hao Hua
, Nguyen Anh Tu
, Jae-Woo Kim, Seung-Hwan Kim, Dong-Seong Kim
:
3D Action Recognition Exploiting Hierarchical Deep Feature Fusion Model. 1-3 - Melody Moh

, Teng-Sheng Moh
, Brian Khieu:
No "Love" Lost: Defending Hate Speech Detection Models Against Adversaries. 1-6 - Nur Zaimah Ahmad

, Megat F. Zuhairi, Hassan Dao, Eiad Yafi:
DNS Server Caching and Forwarding with Load Balance. 1-5 - Chu-Hsing Lin, Jung-Chun Liu, Po-Kai Yang:

Performance Enhancement of GPU Parallel Computing Using Memory Allocation Optimization. 1-5 - Sangwon Kim

, Thummin Lee, Keecheon Kim:
Research on the traffic type recognition technique for advanced network control using Floodlight. 1-6 - Dylan Wang, Melody Moh

, Teng-Sheng Moh
:
Using Deep Learning to Solve Google reCAPTCHA v2's Image Challenges. 1-5 - Liang Jung, Wen-Hung Liao

, Yi-Chieh Wu
:
Toward Automatic Recognition of Cursive Chinese Calligraphy : An Open Dataset For Cursive Chinese Calligraphy Text*. 1-5 - Shu Yano, Kenji Matsuura, Hiroki Tanioka

, Stephen Karungaru, Naoya Kohda, Naka Gotoda, Tomohito Wada:
Tactics-Trend Analysis for Increasing the Possibility of Shooting in a Basketball Match. 1-4 - Takumi Kuramoto, Shuji Abe, Hiroaki Ishihata:

Sex Classification of Salmon Using Convolutional Neural Network. 1-4 - Zahidah Abd Kadir

, Nurul Shuhadah Rosni, Bazilah A. Talip, Mohd Amin Che Mohd Shabri:
Mobile Marker-based Augmented Reality Coloring Sheets Development for Dengue Awareness. 1-5 - AbdulAleem Al-Othmani, Azizah Abdul Manaf, Akram M. Zeki

, Qusay Al-Maatouk
, Abdulaziz Aborujilah, Maen T. Al-Rashdan:
Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech Signal. 1-6 - Emil Thorstensen Jensen, Martin Hansen, Evelyn Eika, Frode Eika Sandnes:

Country Selection on Web Forms: A Comparison of Dropdown Menus, Radio Buttons and Text Field with Autocomplete. 1-4 - Muhammad Sadiq, Syed Imran Ali, Muhammad Bilal Amin, Sungyoung Lee:

A Vertex Matcher for Entity Resolution on Graphs. 1-4 - SeongKu Kang

, Junyoung Hwang, Hwanjo Yu:
Multi-Modal Component Embedding for Fake News Detection. 1-6 - Ying Chieh Liu, Yu-An Huang:

Information Systems Outsourcing Success- A Perspective of Information Processing Theory. 1-3 - Jaeeun Shin, Sangwon Lee

:
Intimacy Between Actual Users and Virtual Agents: Interaction through "likes" and "comments". 1-4 - Sung Yon Park, Dong In Kim

:
Intelligent Reflecting Surface-aided Phase-Shift Backscatter Communication. 1-5 - Haekwon Jeong, Syed M. Raza

, Dung T. Nguyen
, Siwon Kim, Moonseong Kim, Hyunseung Choo:
Control Plane Design for Failure Protection in Software Defined Service Function Chains. 1-6 - Zhafri Hariz Roslan

, Zalizah Awang Long
, Mohd Nizam Husen, Roslan Ismail, Robiah Hamzah:
Deep Learning for Tree Crown Detection In Tropical Forest. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














