2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)最新文献

筛选
英文 中文
CbI-M: Context-based Intervention Methodology for Rehabilitation of Persons with NCDs 基于情境的非传染性疾病患者康复干预方法
H. M. Bilal, Usman Akhtar, Asim Abbas, Muhammad Asif Razzaq, U. Rehman, Jamil Hussain, S. Kang, Sungyoung Lee, Seong-Bae Park
{"title":"CbI-M: Context-based Intervention Methodology for Rehabilitation of Persons with NCDs","authors":"H. M. Bilal, Usman Akhtar, Asim Abbas, Muhammad Asif Razzaq, U. Rehman, Jamil Hussain, S. Kang, Sungyoung Lee, Seong-Bae Park","doi":"10.1109/IMCOM51814.2021.9377326","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377326","url":null,"abstract":"Recent evidence shows that occurrence of Non-Communicable Diseases (NCDs) are the leading cause of death in low and middle-income countries. The fitness applications are not capable enough to help persons with NCDs to change their lifestyle behavior for improving life quality. Currently, the major focus of the existing healthcare applications is towards general public fitness. However, existing solutions lacks in monitoring and adaptation of healthy behaviors. The rehabilitation of person with NCDs is very demanding and challenging to avoid and reduce the advert impacts. In this paper, we argue that the context based behavior adaption observing multiple factors provides an appropriate solution. We have developed a methodology of context-based Just-in-Time actionable interventions for adopting healthy behavior. The risk factors defining the target context are obtained from literature and evaluated by 7 experts with inter-rater agreement kappa value of 0.5 based on 3 categories. The result shows the effectiveness of our proposed approach and depicts the usefulness of context-based intervention in terms of higher receptivity and user satisfaction level. The implicit feedback from 142 persons with different NCDs highlighted the effectiveness of methodology with 82.37% of responded intervention. Whereas, the explicit UEQ benchmark result indicated that the application got excellent responses in the categories of attractiveness, motivation, and novelty.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115032373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Scheme for the Generation of Ordered Trees in Constant Amortized Time 常数平摊时间内有序树生成的一种有效方法
V. Parque, T. Miyashita
{"title":"An Efficient Scheme for the Generation of Ordered Trees in Constant Amortized Time","authors":"V. Parque, T. Miyashita","doi":"10.1109/IMCOM51814.2021.9377349","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377349","url":null,"abstract":"Trees are useful entities allowing to model data structures and hierarchical relationships in networked decision systems ubiquitously. An ordered tree is a rooted tree where the order of the subtrees (children) of a node is significant. In combinatorial optimization, generating ordered trees is relevant to evaluate candidate combinatorial objects. In this paper, we present an algebraic scheme to generate ordered trees with $n$ vertices with utmost efficiency; whereby our approach uses $O$ (n) space and $O$ (1) time in average per tree. Our computational studies have shown the feasibility and efficiency to generate ordered trees in constant time in average, in about one tenth of a millisecond per ordered tree. Due to the 1–1 bijective nature to other combinatorial classes, our approach is favorable to study the generation of binary trees with $n$ external nodes, trees with $n$ nodes, legal sequences of $n$ pairs of parentheses, triangulated n-gons, gambler's sequences and lattice paths. We believe our scheme may find its use in devising algorithms for planning and combinatorial optimization involving Catalan numbers.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130286518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evolutionary Algorithms and Efficient Data Analytics for Image Processing 图像处理的进化算法和高效数据分析
F. Mohammadi, Farzan Shenavarmasouleh, M. Amini, H. Arabnia
{"title":"Evolutionary Algorithms and Efficient Data Analytics for Image Processing","authors":"F. Mohammadi, Farzan Shenavarmasouleh, M. Amini, H. Arabnia","doi":"10.1109/IMCOM51814.2021.9377426","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377426","url":null,"abstract":"Steganography algorithms facilitate communication between a source and a destination in a secret manner. This is done by embedding messages/text/data into images without impacting the appearance of the resultant images/videos. Ste-ganalysis is the science of determining if an image has secret messages embedded/hidden in it. Because there are numerous steganography algorithms, and since each one of them requires a different type of steganalysis, the steganalysis process is extremely challenging. Thus, researchers aim to develop one universal steganalysis to detect all steganography algorithms. Universal steganalysis extracts a large number of features to distinguish stego images from cover images. However, this leads to the problem of the curse of dimensionality (CoD), which is considered to be an NP-hard problem. Generating a machine learning based model also takes a long time which makes real-time processing appear impossible in any optimization for time-intensive fields such as visual computing. In this study, we investigate previously developed evolutionary algorithms for boosting real-time image processing and argue that they provide the most promising solutions for the CoD problem.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信