default search action
AIIoT 2022: Seattle, WA, USA
- 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 6-9, 2022. IEEE 2022, ISBN 978-1-6654-8453-4
- Aushtmi Deb, Mst. Sadia Akter Koli, Sheikh Beauty Akter, Adil Ahmed Chowdhury:
An Outcome Based Analysis on Heart Disease Prediction using Machine Learning Algorithms and Data Mining Approaches. 1-7 - Maryam Ghanbari, Witold Kinsner, Nariman Sepehri:
Detection of Faults in Electro-Hydrostatic Actuators Using Feature Extraction Methods and an Artificial Neural Network. 1-7 - Christopher Le, Alvaro Martin Grande, A. J. Carmine, Jordan Thompson, Tauheed Khan Mohd:
Analysis of Various Vulnerabilities in the Raspbian Operating System and Solutions. 1-6 - Carlos José Martínez, Sebastià Galmés:
Analysis of the primary attacks on IoMT Internet of Medical Things communications protocols. 1-7 - Mohammed Faisal Naji, Chibli Joumaa, Yousef Alswailem, Abdulrahman Alobthni, Rayan Albusilan:
Machine Learning-based System for Monitoring Social Distancing and Mask Wearing. 1-8 - Chanuka Bandara, Ashan Dhanuka Sandanayake, Yehan Kodithuwakku, V. Logeeshan:
Automated Medicinal-Pill Dispenser with Cellular and Wi-Fi IoT Integration. 1-7 - Maame Araba Vander-Pallen, Paul Addai, Stuart Isteefanos, Tauheed Khan Mohd:
Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 onwards. 1-7 - Brandon Wood, Khaled Slhoub:
Detecting Amazon Bot Reviewers Using Unsupervised and Supervised Learning. 1-8 - Xinchen Xie, Chen Li, Lihua Tian:
Feature Fusion Network Based on Hybrid Attention for Semantic Segmentation. 9-14 - Wael Khallouli, Raphael Pamie-George, Samuel F. Kovacic, Andres Sousa-Poza, Mustafa Canan, Jiang Li:
Leveraging Transfer Learning and GAN Models for OCR from Engineering Documents. 15-21 - Tyler Groom, Kiran George:
Real Time FPGA-Based CNN Training and Recognition of Signals. 22-26 - Tanya Bhardwaj, Paridhi Gupta, Akshita Goyal, Akanksha Nagpal, Vivekanand Jha:
A Review on Suicidal Ideation Detection Based on Machine Learning and Deep Learning Techniques. 27-31 - Syed Khurram Mahmud, Yue Chen, Kok Keong Chai:
Ensemble Reinforcement Learning Framework for Sum Rate Optimization in NOMA-UAV Network. 32-38 - Renato R. Maaliw, Karen Anne C. Quing, Julie Ann B. Susa, Jed Frank S. Maraueses, Ace C. Lagman, Rossana T. Adao, Ma. Corazon Fernando Raguro, Ranie Baul Canlas:
Clustering and Classification Models For Student's Grit Detection in E-Learning. 39-45 - Raghubir Singh, József Kovács, Tamás Kiss:
To Offload or Not? An Analysis of Big Data Offloading Strategies from Edge to Cloud. 46-52 - Nandang Sunandar, Achmad Nizar Hidayanto:
Data Quality Management Improvement: Case Studi PT BPI. 53-58 - Lucero Sovero Rivera, Nicole Ninamango Origuela, Grimaldo Quispe Santivañez:
Analysis of the Financial Efficiency of Companies in the Industrial Sector during COVID-19: Case Study in Peru. 59-64 - Kevin Matthe Caramancion:
Using Timer Data to Conjunct Self-Reported Measures in Quantifying Deception. 65-70 - Nur Uddin, Hendi Hermawan, Nur Layli Rachmawati, Hendy Tannady:
Genetic Algorithm for Logistics-Route Optimization in Urban Area. 71-76 - Shereen Ismail, Diana Dawoud, Hassan Reza:
Towards A Lightweight Identity Management and Secure Authentication for IoT Using Blockchain. 77-83 - Bhargavi Krishnamurthy, Sajjan G. Shiva, Saikat Das:
MVE-based Reinforcement Learning Framework with Explainability for improving Quality of Experience of Application Placement in Fog Computing. 84-90 - Saroj Mishra, Hassan Reza:
A Face Recognition Method Using Deep Learning to Identify Mask and Unmask Objects. 91-99 - Bhargavi Krishnamurthy, Sajjan G. Shiva:
Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach. 100-105 - Sayan Shaw, Keaton Chia, Jan Kleissl:
Neighbor-Based Optimized Logistic Regression Machine Learning Model For Electric Vehicle Occupancy Detection. 106-110 - Renato R. Maaliw, Julie Ann B. Susa, Alvin Sarraga Alon, Ace C. Lagman, Shaneth C. Ambat, Manuel Bautista Garcia, Keno Cruz Piad, Ma. Corazon Fernando Raguro:
A Deep Learning Approach for Automatic Scoliosis Cobb Angle Identification. 111-117 - Paul Addai, Tauheed Khan Mohd:
Power and Telecommunication Lines Detection and Avoidance for Drones. 118-123 - Opeoluwa Tosin Eluwole, Segun Akande, Oluwole Abiodun Adegbola:
Major threats to the continued adoption of Artificial Intelligence in today's hyperconnected world. 124-130 - Sultan Ahmed Almalki, Ahmed Abdel-Rahim, Frederick T. Sheldon:
Disrupting the Cooperative Nature of Intelligent Transportation Systems. 131-137 - Jordan Johnston, Kaiman Zeng, Nansong Wu:
An Evaluation and Embedded Hardware Implementation of YOLO for Real-Time Wildfire Detection. 138-144 - Muthana Zouri, Alexander Ferworn:
An Approach for Automatic Discovery of Rules Based on ECG Data Using Learning Classifier Systems. 145-154 - Hebah Alquran, Shadi Banitaan:
Fake News Detection in Social Networks Using Data Mining Techniques. 155-160 - Sanskar Raj Marahata, Eman Abdelfattah, Sandra Ibrahim, Audrina Dobrevic:
No-Clear for Nuclear. 161-166 - Ismail A. Idowu, Kofi Nyarko, Otily Toutsop:
Computer Vision Method in Means of Egress Obstruction Detection. 167-173 - Kanchan Singh, Sakshi S. Grover, Ranjini Kishen Kumar:
Cyber Security Vulnerability Detection Using Natural Language Processing. 174-178 - Kaushallya Adhikari:
Shift-Invariant Structure-Imposed Convolutional Neural Networks for Direction of Arrival Estimation. 179-186 - Muntasir Mamun, Afia Farjana, Miraz Al Mamun, Md Salim Ahammed:
Lung cancer prediction model using ensemble learning techniques and a systematic review analysis. 187-193 - Muntasir Mamun, Afia Farjana, Miraz Al Mamun, Md Salim Ahammed, Md Minhazur Rahman:
Heart failure survival prediction using machine learning algorithm: am I safe from heart failure? 194-200 - Hamid Nasiri, Ghazal Kheyroddin, Morteza Dorrigiv, Mona Esmaeili, Amir Raeisi Nafchi, Mohsen Haji Ghorbani, Payman Zarkesh-Ha:
Classification of COVID-19 in Chest X-ray Images Using Fusion of Deep Features and LightGBM. 201-206 - Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa-Poza, Mustafa Canan, Samuel F. Kovacic, Jiang Li:
Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks. 207-212 - Mohammad Affan Khalil, Maria Ramirez, Johnny Can, Kiran George:
Implementation of Machine Learning in BCI Based Lie Detection. 213-217 - Mina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Maryam Heidari:
A Survey on Deep Learning Techniques for Joint Named Entities and Relation Extraction. 218-224 - Argeen Blanco, Lance Victor Del Rosario, Ken Ichiro Jose, Melchizedek Alipio:
Deep Learning Models for Water Potability Classification in Rural Areas in the Philippines. 225-231 - Md Rakibul Ahasan, Mirza Sanita Haque, Mohammad Rubbyat Akram, Mohammed Fahim Momen, Md. Golam Rabiul Alam:
Deep Learning Autoencoder based Anomaly Detection Model on 4G Network Performance Data. 232-237 - Md. Milon Uddin, Jounsup Park:
Machine learning model evaluation for 360° video caching. 238-244 - Maria Ramirez, Mohammad Affan Khalil, Johnny Can, Kiran George:
Classification of "Like" and "Dislike" Decisions From EEG and fNIRS Signals Using a LSTM Based Deep Learning Network. 252-255 - Jacob Koch, Wei Hao:
Practical Applications of Edge Computing to Accelerate Cloud Hosted Web Content. 256-263 - Patrick Kopacz, Md Minhaz Chowdhury:
Cloud Computing Security and Future. 264-269 - Eric M. Toth, Md Minhaz Chowdhury:
Honeynets and Cloud Security. 270-275 - Audrey Long, Daniel Choi, Joel Coffman:
Using Amazon Managed Blockchain for ePHI An Analysis of Hyperledger Fabric and Ethereum. 276-282 - Shereen Ismail, Hassan Reza:
Evaluation of Naïve Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks. 283-289 - Lap-Man Hoi, Yuqi Sun, Sio Kei Im:
An Automatic Speech Segmentation Algorithm of Portuguese based on Spectrogram Windowing. 290-295 - Khan Md. Hasib, Shadman Sakib, Jubayer Al Mahmud, Kamruzzaman Mithu, Md. Saifur Rahman, Mohammad Shafiul Alam:
COVID-19 Prediction based on Infected Cases and Deaths of Bangladesh using Deep Transfer Learning. 296-302 - Kayla Lee, Kiran George:
Pulse and Signal Data Classification Using Conventional and Few-Shot Machine Learning. 311-317 - Javier de la Cruz, Douglas Shimizu, Kiran George:
EEG and fNIRS Analysis Using Machine Learning to Determine Stress Levels. 318-322 - Mohamed Bin Alhaj, Hexu Liu, Osama Abudayyeh, Mohammed Sulaiman:
Development of a mobile application for occupant-centric facility maintenance management. 323-329 - David Mayo, Heba Elgazzar:
Predicting Cryptocurrency Price Change Direction from Supply-Side Factors via Machine Learning Methods. 330-336 - Benedicta Nana Esi Nyarko, Wu Bin, Jinzhi Zhou, George Kofi Agordzo, Justice Odoom, Ebenezer Koukoyi:
Comparative Analysis of AlexNet, Resnet-50, and Inception-V3 Models on Masked Face Recognition. 337-343 - Francis Liri, Austin Luu, Kiran George, Axel Angulo, Johnathan Dittloff:
Real-Time Dynamic Object Grasping with a Robotic Arm: A Design for Visually Impaired Persons. 344-350 - Abdullah Al-Monsur, M. D. Rizwanul Kabir, Abrar Mohammad Ar-Rafi, Mirza Muntasir Nishat, Fahim Faisal:
Covid-EnsembleNet: An Ensemble Based Approach for Detecting Covid-19 by utilising Chest X-ray Images. 351-356 - Ehsan Naderi, Arash Asrari:
Toward Detecting Cyberattacks Targeting Modern Power Grids: A Deep Learning Framework. 357-363 - Chukwuemeka Duru, Jumoke Ladeji-Osias, Ketchiozo Wandji, Otily Toutsop, Rachida Kone:
A Review of Human Immune Inspired Algorithms for Intrusion Detection Systems. 364-371 - Aakib Bin Nesar, Tahseena Mahmud, Fahreen Hossain:
Simulating the Behaviour and Displacement of Women in Water-Stressed Areas. 372-378 - Lane Rizkallah, Nick Potter, Kyle Reed, Dylan Reynolds, Mohammed Salman, Suman Bhunia:
Red Toad, Blue Toad, Hacked Toad? 379-386 - Bharat S. Rawal, Lingampally Shiva Kumar, Sriram Maganti, Varun Godha:
Comparative Study of Sha-256 Optimization Techniques. 387-392 - Antonio Ornatelli, Alessandro Giuseppi, Andrea Tortorelli:
A Distributed Average Cost Reinforcement Learning approach for Power Control in Wireless 5G Networks. 393-399 - Aaniya Agrawala, Vidhi Katyal, Neha Pandey, Astha Jain, Vivekanand Jha:
A Review on Energy Efficient Strategies for Corona Based Architecture in Wireless Sensor Networks. 400-406 - Razib Hayat Khan, Jonayet Miah:
Performance Evaluation of a new one-time password (OTP) scheme using stochastic petri net (SPN). 407-412 - Xiaojie Mu, Cheol-Hong Min:
Wearable Sensing and Physical Exercise Recognition. 413-417 - Nicholas Foley, Chen-Hsiang Yu:
MusCare+: Muscle Monitoring for Anomalies. 425-430 - Cesar Martinez Melgoza, Kayla Lee, Tyler Groom, Nate Ruppert, Kiran George, Henry Lin:
Comparing Pretrained Image-Net CNN with a Siamese Architecture for Few-Shot Learning Applications in Radar Systems. 431-436 - Calum McCormack, Christopher Wallace, Peter Barrie, Gordon Morison:
Day ahead Power Demand Forecasting for Hybrid Power at the Edge. 437-441 - Chad O'Brien, Cheol-Hong Min:
Classification of Various Workout Motions Using Wearable Sensors. 442-446 - Armin Esmaeilzadeh, Mina Esmail Zadeh Nojoo Kambar, Maryam Heidari:
Graph Attention Neural Network Distributed Model Training. 447-452 - Adenrele A. Ishola, Damian Valles:
Using Machine Learning and Regression Analysis to Classify and Predict Danger Levels in Burning Sites. 453-459 - Mohammad Monirujjaman Khan, Md. Farabi Alam, Shoumik Mahabub Ridoy:
ComparativeAnalysisofARIMAandLSTMM achine Learning Algorithm for Stock PricePrediction. 460-465 - Abel Desoto, Ethan Santos, Francis Liri, Kenneth Faller, Devin Heng, Joshua Dodd, Kiran George, Julia Drouin:
Predicting Audio Training Learning Outcomes Using EEG Data and KNN Modeling. 466-470 - Salah-Eddine Mansour, Abdelhak Sakhi, Larbi Kzaz, Amine Erroutbi, Abderrahim Sekkaki:
Electronic device for acquiring images of sardine cans. 471-475 - Nur Apriyanto, Yudi Priyadi, Dana Sulistiyo Kusumo:
Extraction of Step Performed in Use Case Description as a Reference for Conformity of Sequence Diagrams Using Text Mining (Case Study: SRS APTU). 476-482 - Talha Hassan, Tauheed Khan Mohd:
Comparison of Task Performance and User Satisfaction Between Holographic and Standard QWERTY Keyboard. 483-488 - Laily Mariz A. Bengua, Vanessa Jane D. De Guzman, Danica Mae S. Macunat, Efren D. Villaverde, Aubee T. Mahusay, Renato R. Maaliw, Ace C. Lagman, Alvin S. Alon:
Salted Egg Cleaning and Grading System Using Machine Vision. 489-493 - Zhao Xiang Lim, Xiu Qi Ho, Daniel Zhonghao Tan, Weihan Goh:
Ensuring Web Integrity through Content Delivery Networks. 494-500 - Christopher Faircloth, Gavin Hartzell, Nathan Callahan, Suman Bhunia:
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft. 501-507 - Outi-Marja Latvala, Ivo Emanuilov, Tatu Niskanen, Pia Raitio, Jarno Salonen, Diogo Santos, Katerina Yordanova:
Proof-of-Concept for a Granular Incident Management Information Sharing Scheme. 515-520 - Bhargavi Krishnamurthy, Sajjan G. Shiva:
Energy Efficient Double Critic Deep Deterministic Policy Gradient Framework for Fog Computing. 521-527 - Md Mahadi Hassan Sohan, Mohammad Monirujjaman Khan, Ipseeta Nanda, Rajesh Dey:
Fake Product Review Detection Using Machine Learning. 527-532 - Alonso Montesinos:
Profit Prediction based on Financial Statements using Deep Neural Network. 533-537 - Zahra Salsabila Hernanda, Hani'ah Mahmudah, Rahardhita Widyatra Sudibyo:
CNN-Based Hyperparameter Optimization Approach for Road Pothole and Crack Detection Systems. 538-543 - Khalid Raihan Talha, Koushik Bandapadya, Mohammad Monirujjaman Khan:
Violence Detection Using Computer Vision Approaches. 544-550 - Balarupan Gowrienanthan, N. Kiruthihan, K. D. I. S. Rathnayake, S. Kumarawadu, V. Logeeshan:
Low-Cost Ensembling for Deep Neural Network based Non-Intrusive Load Monitoring. 551-556 - Mostaqim Hossain, Mubassir Habib, Mainuddin Hassan, Faria Soroni, Mohammad Monirujjaman Khan:
Research and Development of an E-commerce with Sales Chatbot. 557-564 - Kabir Hossain, Tonmoy Ghosh, Edward Sazonov:
Development of Cloud-based Infrastructure for Real Time Analysis of Wearable Sensor Signal. 565-570 - I. B. Chandra Irugalbandara, Abdul Salam Naseem, Sasmitha Perera, Velmanickam Logeeshan:
HomeIO: Offline Smart Home Automation System with Automatic Speech Recognition and Household Power Usage Tracking. 571-577 - Tristan Erney, Md Minhaz Chowdhury:
A Survey of Intrusion Detection and Prevention Systems. 578-584 - Frank Antonucci, Md Minhaz Chowdhury:
Botnets as the Modern Attack Vector. 585-590 - Joseph Squillace, May Bantan:
A Taxonomy of Privacy, Trust, and Security Breach Incidents of Internet-of-Things Linked to F(M).A.A.N.G. Corporations. 591-596 - Jamal Alotaibi, Lubna K. Alazzawi:
PPIoV: A Privacy Preserving-Based Framework for IoV- Fog Environment Using Federated Learning and Blockchain. 597-603 - Jack Li, Yi Hu:
Employing Edge Computing to Enhance Self-Defense Capabilities of IoT Devices. 604-610 - Ersin Elbasi:
A Robust Information Hiding Scheme Using Third Decomposition Layer of Wavelet Against Universal Attacks. 611-616 - Sudarshan S. Chawathe:
Automated Determination of Mushroom Edibility Using an Augmented Dataset. 617-623 - Christopher Le, Tauheed Khan Mohd:
Facial Detection in Low Light Environments Using OpenCV. 624-628 - Brook W. Abegaz:
ADMSV - A Differential Machine Learning based Steering Controller for Smart Vehicles. 629-634 - Sudarshan S. Chawathe:
Optical Features for Automated Determination of Agricultural Product Varieties. 635-641 - Rimma Dzhusupova, Richa Banotra, Jan Bosch, Helena Holmström Olsson:
Pattern Recognition Method for Detecting Engineering Errors on Technical Drawings. 642-648 - Fu-Shiung Hsieh:
A Hybrid Firefly-DE algorithm for Ridesharing Systems with Cost Savings Allocation Schemes. 649-653 - Shreehar Joshi, Eman Abdelfattah, Ryan Osgood:
Classification of Movie Success: A Comparison of Two Movie Datasets. 654-658 - Tania Angelina Hutajulu, Yudi Priyadi, Arfive Gandhi:
Text Data Processing in Requirement Specifications as a Reference for Similarities Between Use Case Diagrams and Use Case Descriptions for Smart Sleeping Lamp Application Documents. 665-671 - Junifar Adam Pamungkas, Yudi Priyadi, Muhammad Johan Alibasa:
Measurement of Similarity Between Requirement Elicitation and Requirement Specification Using Text Pre-Processing in the Cinemaloka Application. 672-678 - Elsa Jelista Sari, Yudi Priyadi, Rosa Reska Riskiana:
Implementation of Semantic Textual Similarity between Requirement Specification and Use Case Description Using WUP Method (Case Study: Sipjabs Application). 681-687 - Min Hyung Lee, Richard Kyung:
Mental Health Stigma and Natural Language Processing: Two Enigmas Through the Lens of a Limited Corpus. 688-691 - Afra Mashhadi, Ali Tabaraei, Yuting Zhan, Reza M. Parizi:
An Auditing Framework for Analyzing Fairness of Spatial-Temporal Federated Learning Applications. 699-707 - Ferdaus Ahmed, Zarin Tasnim, Masud Rana, Mohammad Monirujjaman Khan:
Development of Low Cost Smart Cane with GPS. 715-724 - Adam Borys, Abu Kamruzzaman, Hasnain Nizam Thakur, Joseph C. Brickley, Md Liakat Ali, Kutub Thakur:
An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet. 725-729 - Miroslav Bures, Pavel Blazek, Jiri Nema, Hynek Schvach:
Factors Impacting Resilience of Internet of Things Systems in Critical Infrastructure. 730-735 - Kumar Saurabh, Tanuj Kumar, Uphar Singh, O. P. Vyas, Rahamatullah Khondoker:
NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains. 736-742 - Praveen Sai Bere, Mohammed Zafar Ali Khan:
Bit switching decoding of Cyclic Hamming codes for IoT applications. 743-748 - Vyas O'Neill, Ben Soh:
Applying Aspect-Oriented Design Methodology to Manage Time-Validity of Information in Internet-of-Things Systems. 749-752 - Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker:
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks. 753-759 - Yehan Kodithuwakku, Ashan Dhanuka Sandanayake, Chanuka Bandara, V. Logeeshan:
IoT Based Healthcare Kit for Domestic Usage. 760-765 - AlaaAllah A. ElSabaa, Florimond Guéniat, Wenyan Wu, Michael Ward:
Enhanced Data-Driven LoRa LP-WAN Channel Model in Birmingham. 766-772 - Urvi Goel, Kaial Mongia, Quanta Gupta, Hansika Rajput, Vivekanand Jha:
Sparse Mobile Crowdsensing: Components and Frameworks. 773-778 - Ashan Dhanuka Sandanayake, Yehan Kodithuwakku, Chanuka Bandara, V. Logeeshan:
Smart Three In One System For Indoor Safety Assurance. 779-785 - Amin H. Al-Ka'bi:
Proposed Antenna Design for IoT and 5G-WiFi Applications. 786-790
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.